312-50v10 Exam - Certified Ethical Hacker v10

certleader.com

P.S. Practical 312-50v10 free demo are available on Google Drive, GET MORE: https://drive.google.com/open?id=1zsw3xzCsgbQD0e_ZoE_G5GuVGlIbaphk


New EC-Council 312-50v10 Exam Dumps Collection (Question 6 - Question 15)

Q6. The "white box testing" methodology enforces what kind of restriction?

A. Only the internal operation of a system is known to the tester.

B. The internal operation of a system is completely known to the tester.

C. The internal operation of a system is only partly accessible to the tester.

D. Only the external operation of a system is accessible to the tester.

Answer: B


Q7. You perform a scan of your companyu2021s network and discover that TCP port 123 is open. What services by default run on TCP port 123?

A. Telnet

B. POP3

C. Network Time Protocol

D. DNS

Answer: C


Q8. Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students.

He identified this when the IDS alerted for malware activities in the network. What should Bob do to avoid this problem?

A. Disable unused ports in the switches

B. Separate students in a different VLAN

C. Use the 802.1x protocol

D. Ask students to use the wireless network

Answer: C


Q9. In Risk Management, how is the term "likelihood" related to the concept of "threat?"

A. Likelihood is the likely source of a threat that could exploit a vulnerability.

B. Likelihood is the probability that a threat-source will exploit a vulnerability.

C. Likelihood is a possible threat-source that may exploit a vulnerability.

D. Likelihood is the probability that a vulnerability is a threat-source.

Answer: B


Q10. You are logged in as a local admin on a Windows 7 system and you need to launch the Computer Management Console from command line.

Which command would you use?

A. c:\gpedit

B. c:\compmgmt.msc

C. c:\ncpa.cp

D. c:\services.msc

Answer: B


Q11. What type of vulnerability/attack is it when the malicious person forces the useru2021s browser to send an authenticated request to a server?

A. Cross-site request forgery

B. Cross-site scripting

C. Session hijacking

D. Server side request forgery

Answer: A


Q12. In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?

A. Keyed Hashing

B. Key Stretching

C. Salting

D. Double Hashing

Answer: C


Q13. Which Intrusion Detection System is the best applicable for large environments where critical assets on the network need extra security and is ideal for observing sensitive network segments?

A. Honeypots

B. Firewalls

C. Network-based intrusion detection system (NIDS)

D. Host-based intrusion detection system (HIDS)

Answer: C


Q14. What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?

A. Deferred risk

B. Impact risk

C. Inherent risk

D. Residual risk

Answer: D


Q15. The following is part of a log file taken from the machine on the network with the IP address of 192.168.0.110:

What type of activity has been logged?

A. Teardrop attack targeting 192.168.0.110

B. Denial of service attack targeting 192.168.0.105

C. Port scan targeting 192.168.0.110

D. Port scan targeting 192.168.0.105

Answer: C


100% Refresh EC-Council 312-50v10 Questions & Answers shared by Dumpscollection, Get HERE: http://www.dumpscollection.net/dumps/312-50v10/ (New Q&As)