Proper study guides for Most recent EC-Council Certified Ethical Hacker v10 certified begins with EC-Council 312-50v10 preparation products which designed to deliver the Real 312-50v10 questions by making you pass the 312-50v10 test at your first time. Try the free 312-50v10 demo right now.
P.S. Real 312-50v10 preparation exams are available on Google Drive, GET MORE: https://drive.google.com/open?id=1Eru4mEcUV0ULWTU_25JjeXA4U_MAK122
Question No: 1
Firewalls are the software or hardware systems that are able to control and monitor the traffic coming in and out the target network based on pre-defined set of rules.
Which of the following types of firewalls can protect against SQL injection attacks?
A. Data-driven firewall
B. Stateful firewall
C. Packet firewall
D. Web application firewall
Answer: D
Question No: 2
What is the most common method to exploit the u201cBash Bugu201d or u201cShellShock" vulnerability?
A. Manipulate format strings in text fields
B. SSH
C. SYN Flood
D. Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web server
Answer: D
Question No: 3
You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity. What tool would you most likely select?
A. Snort
B. Nmap
C. Cain & Abel
D. Nessus
Answer: A
Question No: 4
Which of the following is a low-tech way of gaining unauthorized access to systems?
A. Scanning
B. Sniffing
C. Social Engineering
D. Enumeration
Answer: C
Question No: 5
When does the Payment Card Industry Data Security Standard (PCI-DSS) require organizations to perform external and internal penetration testing?
A. At least twice a year or after any significant upgrade or modification
B. At least once a year and after any significant upgrade or modification
C. At least once every two years and after any significant upgrade or modification
D. At least once every three years or after any significant upgrade or modification
Answer: B
Question No: 6
From the following table, identify the wrong answer in terms of Range (ft).
A. 802.11b
B. 802.11g
C. 802.16(WiMax)
D. 802.11a
Answer: D
Question No: 7
An attacker scans a host with the below command. Which three flags are set? (Choose three.)
#nmap u2013sX host.domain.com
A. This is ACK scan. ACK flag is set
B. This is Xmas scan. SYN and ACK flags are set
C. This is Xmas scan. URG, PUSH and FIN are set
D. This is SYN scan. SYN flag is set
Answer: C
Question No: 8
Security Policy is a definition of what it means to be secure for a system, organization or other entity. For Information Technologies, there are sub-policies like Computer Security Policy, Information Protection Policy, Information Security Policy, network Security Policy, Physical Security Policy, Remote Access Policy, and User Account Policy.
What is the main theme of the sub-policies for Information Technologies?
A. Availability, Non-repudiation, Confidentiality
B. Authenticity, Integrity, Non-repudiation
C. Confidentiality, Integrity, Availability
D. Authenticity, Confidentiality, Integrity
Answer: C
Question No: 9
During the process of encryption and decryption, what keys are shared?
A. Private keys
B. User passwords
C. Public keys
D. Public and private keys
Answer: C
Question No: 10
Why should the security analyst disable/remove unnecessary ISAPI filters?
A. To defend against social engineering attacks
B. To defend against webserver attacks
C. To defend against jailbreaking
D. To defend against wireless attacks
Answer: B
P.S. Easily pass 312-50v10 Exam with Certleader Real Dumps & pdf vce, Try Free: https://www.certleader.com/312-50v10-dumps.html ( New Questions)