Exam Details

  • Exam Code
    :312-50V10
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v10)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :747 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V10 Questions & Answers

  • Question 271:

    Which protocol is used for setting up secured channels between two devices, typically in VPNs?

    A. IPSEC

    B. PEM

    C. SET

    D. PPP

  • Question 272:

    You are an Ethical Hacker who is auditing the ABC company. When you verify the NOC one of the machines has 2 connections, one wired and the other wireless. When you verify the configuration of this Windows system you find two static routes.

    route add 10.0.0.0 mask 255.0.0.0 10.0.0.1

    route add 0.0.0.0 mask 255.0.0.0 199.168.0.1

    What is the main purpose of those static routes?

    A. Both static routes indicate that the traffic is external with different gateway.

    B. The first static route indicates that the internal traffic will use an external gateway and the second static route indicates that the traffic will be rerouted.

    C. Both static routes indicate that the traffic is internal with different gateway.

    D. The first static route indicates that the internal addresses are using the internal gateway and the second static route indicates that all the traffic that is not internal must go to an external gateway.

  • Question 273:

    A penetration test was done at a company. After the test, a report was written and given to the company's IT authorities. A section from the report is shown below:

    According to the section from the report, which of the following choice is true?

    A. MAC Spoof attacks cannot be performed.

    B. Possibility of SQL Injection attack is eliminated.

    C. A stateful firewall can be used between intranet (LAN) and DMZ.

    D. There is access control policy between VLANs.

  • Question 274:

    An attacker tries to do banner grabbing on a remote web server and executes the following command.

    Service detection performed. Please report any incorrect results at http://nmap.org/submit/.

    Nmap done: 1 IP address (1 host up) scanned in 6.42 seconds

    What did the hacker accomplish?

    A. nmap can't retrieve the version number of any running remote service.

    B. The hacker successfully completed the banner grabbing.

    C. The hacker should've used nmap -O host.domain.com.

    D. The hacker failed to do banner grabbing as he didn't get the version of the Apache web server.

  • Question 275:

    The establishment of a TCP connection involves a negotiation called 3 way handshake. What type of message sends the client to the server in order to begin this negotiation?

    A. RST

    B. ACK

    C. SYN-ACK

    D. SYN

  • Question 276:

    To maintain compliance with regulatory requirements, a security audit of the systems on a network must be performed to determine their compliance with security policies. Which one of the following tools would most likely be used in such an audit?

    A. Vulnerability scanner

    B. Protocol analyzer

    C. Port scanner

    D. Intrusion Detection System

  • Question 277:

    During a security audit of IT processes, an IS auditor found that there were no documented security procedures. What should the IS auditor do?

    A. Identify and evaluate existing practices

    B. Create a procedures document

    C. Conduct compliance testing

    D. Terminate the audit

  • Question 278:

    Websites and web portals that provide web services commonly use the Simple Object Access Protocol SOAP. Which of the following is an incorrect definition or characteristics in the protocol?

    A. Based on XML

    B. Provides a structured model for messaging

    C. Exchanges data between web services

    D. Only compatible with the application protocol HTTP

  • Question 279:

    Which of the following is a passive wireless packet analyzer that works on Linux-based systems?

    A. Burp Suite

    B. OpenVAS

    C. tshark

    D. Kismet

  • Question 280:

    PGP, SSL, and IKE are all examples of which type of cryptography?

    A. Public Key

    B. Secret Key

    C. Hash Algorithm

    D. Digest

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.