Exam Details

  • Exam Code
    :312-50V10
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v10)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :747 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V10 Questions & Answers

  • Question 101:

    Password cracking programs reverse the hashing process to recover passwords. (True/False.)

    A. True

    B. False

  • Question 102:

    E-mail scams and mail fraud are regulated by which of the following?

    A. 18 U.S.C. par. 1030 Fraud and Related activity in connection with Computers

    B. 18 U.S.C. par. 1029 Fraud and Related activity in connection with Access Devices

    C. 18 U.S.C. par. 1362 Communication Lines, Stations, or Systems

    D. 18 U.S.C. par. 2510 Wire and Electronic Communications Interception and Interception of Oral Communication

  • Question 103:

    What port number is used by LDAP protocol?

    A. 110

    B. 389

    C. 464

    D. 445

  • Question 104:

    While examining audit logs, you discover that people are able to telnet into the SMTP server on port 25. You would like to block this, though you do not see any evidence of an attack or other wrong doing. However, you are concerned about affecting the normal functionality of the email server. From the following options choose how best you can achieve this objective?

    A. Block port 25 at the firewall.

    B. Shut off the SMTP service on the server.

    C. Force all connections to use a username and password.

    D. Switch from Windows Exchange to UNIX Sendmail.

    E. None of the above.

  • Question 105:

    As a securing consultant, what are some of the things you would recommend to a company to ensure DNS security?

    A. Use the same machines for DNS and other applications

    B. Harden DNS servers

    C. Use split-horizon operation for DNS servers

    D. Restrict Zone transfers

    E. Have subnet diversity between DNS servers

  • Question 106:

    Every company needs a formal written document which spells out to employees precisely what they are allowed to use the company's systems for, what is prohibited, and what will happen to them if they break the rules. Two printed copies of the policy should be given to every employee as soon as possible after they join the organization. The employee should be asked to sign one copy, which should be safely filed by the company. No one should be allowed to use the company's computer systems until they have signed the policy in acceptance of its terms.

    What is this document called?

    A. Information Audit Policy (IAP)

    B. Information Security Policy (ISP)

    C. Penetration Testing Policy (PTP)

    D. Company Compliance Policy (CCP)

  • Question 107:

    You are analysing traffic on the network with Wireshark. You want to routinely run a cron job which will run the capture against a specific set of IPs - 192.168.8.0/24. What command you would use?

    A. wireshark --fetch ''192.168.8*''

    B. wireshark --capture --local masked 192.168.8.0 ---range 24

    C. tshark -net 192.255.255.255 mask 192.168.8.0

    D. sudo tshark -f''net 192 .68.8.0/24''

  • Question 108:

    You are performing a penetration test for a client and have gained shell access to a Windows machine on the internal network. You intend to retrieve all DNS records for the internal domain, if the DNS server is at

    192.168.10.2 and the domain name is abccorp.local, what command would you type at the nslookup prompt to attempt a zone transfer?

    A. list server=192.168.10.2 type=all

    B. is-d abccorp.local

    C. Iserver 192.168.10.2-t all

    D. List domain=Abccorp.local type=zone

  • Question 109:

    Bob is acknowledged as a hacker of repute and is popular among visitors of "underground" sites.

    Bob is willing to share his knowledge with those who are willing to learn, and many have expressed their interest in learning from him. However, this knowledge has a risk associated with it, as it can be used for malevolent attacks as well.

    In this context, what would be the most effective method to bridge the knowledge gap between the "black" hats or crackers and the "white" hats or computer security professionals? (Choose the test answer.)

    A. Educate everyone with books, articles and training on risk analysis, vulnerabilities and safeguards.

    B. Hire more computer security monitoring personnel to monitor computer systems and networks.

    C. Make obtaining either a computer security certification or accreditation easier to achieve so more individuals feel that they are a part of something larger than life.

    D. Train more National Guard and reservist in the art of computer security to help out in times of emergency or crises.

  • Question 110:

    What is the proper response for a NULL scan if the port is open?

    A. SYN

    B. ACK

    C. FIN

    D. PSH

    E. RST

    F. No response

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.