312-50v10 Exam - Certified Ethical Hacker v10

certleader.com

P.S. Exact 312-50v10 training tools are available on Google Drive, GET MORE: https://drive.google.com/open?id=1zsw3xzCsgbQD0e_ZoE_G5GuVGlIbaphk


New EC-Council 312-50v10 Exam Dumps Collection (Question 9 - Question 18)

New Questions 9

Which regulation defines security and privacy controls for Federal information systems and organizations?

A. HIPAA

B. EU Safe Harbor

C. PCI-DSS

D. NIST-800-53

Answer: D


New Questions 10

Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?

A. 123

B. 161

C. 69

D. 113

Answer: A


New Questions 11

A company's Web development team has become aware of a certain type of security vulnerability in their Web software. To mitigate the possibility of this vulnerability being exploited, the team wants to modify the software requirements to disallow users from entering HTML as input into their Web application.

What kind of Web application vulnerability likely exists in their software?

A. Cross-site scripting vulnerability

B. Web site defacement vulnerability

C. SQL injection vulnerability

D. Cross-site Request Forgery vulnerability

Answer: A


New Questions 12

Which of the following provides a security professional with most information about the systemu2021s security posture?

A. Wardriving, warchalking, social engineering

B. Social engineering, company site browsing, tailgating

C. Phishing, spamming, sending trojans

D. Port scanning, banner grabbing, service identification

Answer: D


New Questions 13

How does the Address Resolution Protocol (ARP) work?

A. It sends a request packet to all the network elements, asking for the domain name from a specific IP.

B. It sends a request packet to all the network elements, asking for the MAC address from a specific IP.

C. It sends a reply packet to all the network elements, asking for the MAC address from a specific IP.

D. It sends a reply packet for a specific IP, asking for the MAC address.

Answer: B


New Questions 14

Which of these is capable of searching for and locating rogue access points?

A. HIDS

B. NIDS

C. WISS

D. WIPS

Answer: D


New Questions 15

Bob finished a C programming course and created a small C application to monitor the network traffic and produce alerts when any origin sends u201cmanyu201d IP packets, based on the average number of packets sent by all origins and using some thresholds.

In concept, the solution developed by Bob is actually:

A. Just a network monitoring tool

B. A signature-based IDS

C. A hybrid IDS

D. A behavior-based IDS

Answer: A


New Questions 16

Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?

A. ICMP Echo scanning

B. SYN/FIN scanning using IP fragments

C. ACK flag probe scanning

D. IPID scanning

Answer: B


New Questions 17

Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipientu2021s consent, similar to email spamming?

A. Bluesmacking

B. Bluesniffing

C. Bluesnarfing

D. Bluejacking

Answer: D


New Questions 18

During the process of encryption and decryption, what keys are shared?

A. Private keys

B. User passwords

C. Public keys

D. Public and private keys

Answer: C


100% Avant-garde EC-Council 312-50v10 Questions & Answers shared by Dumpscollection, Get HERE: http://www.dumpscollection.net/dumps/312-50v10/ (New Q&As)