Exam Details

  • Exam Code
    :312-50V10
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v10)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :747 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V10 Questions & Answers

  • Question 151:

    Which of the following is the BEST way to protect Personally Identifiable Information (PII) from being exploited due to vulnerabilities of varying web applications?

    A. Use cryptographic storage to store all PII

    B. Use full disk encryption on all hard drives to protect PII

    C. Use encrypted communications protocols to transmit PII

    D. Use a security token to log into all Web applications that use PII

  • Question 152:

    It is a short-range wireless communication technology that allows mobile phones, computers and other devices to connect and communicate. This technology intends to replace cables connecting portable devices with high regards to security.

    A. Bluetooth

    B. Radio-Frequency Identification

    C. WLAN

    D. InfraRed

  • Question 153:

    A company recently hired your team of Ethical Hackers to test the security of their network systems. The company wants to have the attack be as realistic as possible. They did not provide any information besides the name of their company. What phase of security testing would your team jump in right away?

    A. Scanning

    B. Reconnaissance

    C. Escalation

    D. Enumeration

  • Question 154:

    What does a type 3 code 13 represent? (Choose two.)

    A. Echo request

    B. Destination unreachable

    C. Network unreachable

    D. Administratively prohibited

    E. Port unreachable

    F. Time exceeded

  • Question 155:

    You are about to be hired by a well-known Bank to perform penetration tests. Which of the following documents describes the specifics of the testing, the associated violations, and essentially protects both the bank's interest and your liabilities as a tester?

    A. Service Level Agreement

    B. Non-Disclosure Agreement

    C. Terms of Engagement

    D. Project Scope

  • Question 156:

    You've just gained root access to a Centos 6 server after days of trying. What tool should you use to maintain access?

    A. Disable Key Services

    B. Create User Account

    C. Download and Install Netcat

    D. Disable IPTables

  • Question 157:

    TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. Which of the following tools can be used for passive OS fingerprinting?

    A. nmap

    B. ping

    C. tracert

    D. tcpdump

  • Question 158:

    You want to analyze packets on your wireless network. Which program would you use?

    A. Wireshark with Airpcap

    B. Airsnort with Airpcap

    C. Wireshark with Winpcap

    D. Ethereal with Winpcap

  • Question 159:

    XOR is a common cryptographic tool. 10110001 XOR 00111010 is?

    A. 10111100

    B. 11011000

    C. 10011101

    D. 10001011

  • Question 160:

    Shellshock had the potential for an unauthorized user to gain access to a server. It affected many internetfacing services, which OS did it not directly affect?

    A. Windows

    B. Unix

    C. Linux

    D. OS X

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.