Exam Details

  • Exam Code
    :312-50V10
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v10)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :747 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V10 Questions & Answers

  • Question 371:

    It is a vulnerability in GNU's bash shell, discovered in September of 2014, that gives attackers access to run remote commands on a vulnerable system. The malicious software can take control of an infected machine, launch denial-of-service attacks to disrupt websites, and scan for other vulnerable devices (including routers).

    Which of the following vulnerabilities is being described?

    A. Shellshock

    B. Rootshock

    C. Rootshell

    D. Shellbash

  • Question 372:

    In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.

    Which Algorithm is this referring to?

    A. Wired Equivalent Privacy (WEP)

    B. Wi-Fi Protected Access (WPA)

    C. Wi-Fi Protected Access 2 (WPA2)

    D. Temporal Key Integrity Protocol (TKIP)

  • Question 373:

    Initiating an attack against targeted businesses and organizations, threat actors compromise a carefully selected website by inserting an exploit resulting in malware infection. The attackers run exploits on well-known and trusted sites likely to be visited by their targeted victims. Aside from carefully choosing sites to compromise, these attacks are known to incorporate zero-day exploits that target unpatched vulnerabilities. Thus, the targeted entities are left with little or no defense against these exploits.

    What type of attack is outlined in the scenario?

    A. Watering Hole Attack

    B. Heartbleed Attack

    C. Shellshock Attack

    D. Spear Phising Attack

  • Question 374:

    You have compromised a server on a network and successfully opened a shell. You aimed to identify all operating systems running on the network. However, as you attempt to fingerprint all machines in the network using the nmap syntax below, it is not going through.

    What seems to be wrong?

    A. OS Scan requires root privileges.

    B. The nmap syntax is wrong.

    C. This is a common behavior for a corrupted nmap application.

    D. The outgoing TCP/IP fingerprinting is blocked by the host firewall.

  • Question 375:

    Which of the following is the successor of SSL?

    A. TLS

    B. RSA

    C. GRE

    D. IPSec

  • Question 376:

    During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a Demilitarized Zone (DMZ) and a second DNS server on the internal network.

    What is this type of DNS configuration commonly called?

    A. Split DNS

    B. DNSSEC

    C. DynDNS

    D. DNS Scheme

  • Question 377:

    This tool is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools.

    Which of the following tools is being described?

    A. Aircrack-ng

    B. Airguard

    C. WLAN-crack

    D. wificracker

  • Question 378:

    Your company was hired by a small healthcare provider to perform a technical assessment on the network.

    What is the best approach for discovering vulnerabilities on a Windows-based computer?

    A. Use a scan tool like Nessus

    B. Use the built-in Windows Update tool

    C. Check MITRE.org for the latest list of CVE findings

    D. Create a disk image of a clean Windows installation

  • Question 379:

    You are performing a penetration test. You achieved access via a buffer overflow exploit and you proceed to find interesting data, such as files with usernames and passwords. You find a hidden folder that has the administrator's bank account password and login information for the administrator's bitcoin account.

    What should you do?

    A. Report immediately to the administrator

    B. Do not report it and continue the penetration test.

    C. Transfer money from the administrator's account to another account.

    D. Do not transfer the money but steal the bitcoins.

  • Question 380:

    You are using NMAP to resolve domain names into IP addresses for a ping sweep later.

    Which of the following commands looks for IP addresses?

    A. >host -t a hackeddomain.com

    B. >host -t soa hackeddomain.com

    C. >host -t ns hackeddomain.com

    D. >host -t AXFR hackeddomain.com

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.