Exam Details

  • Exam Code
    :312-50V10
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v10)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :747 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V10 Questions & Answers

  • Question 381:

    When you are collecting information to perform a data analysis, Google commands are very useful to find sensitive information and files. These files may contain information about passwords, system functions, or documentation.

    What command will help you to search files using Google as a search engine?

    A. site: target.com filetype:xls username password email

    B. inurl: target.com filename:xls username password email

    C. domain: target.com archive:xls username password email

    D. site: target.com file:xls username password email

  • Question 382:

    Your company performs penetration tests and security assessments for small and medium- sized business in the local area. During a routine security assessment, you discover information that suggests your client is involved with human trafficking.

    What should you do?

    A. Immediately stop work and contact the proper legal authorities.

    B. Copy the data to removable media and keep it in case you need it.

    C. Confront the client in a respectful manner and ask her about the data.

    D. Ignore the data and continue the assessment until completed as agreed.

  • Question 383:

    An attacker changes the profile information of a particular user (victim) on the target website. The attacker uses this string to update the victim's profile to a text file and then submit the data to the attacker's database.

    What is this type of attack (that can use either HTTP GET or HTTP POST) called?

    A. Cross-Site Request Forgery

    B. Cross-Site Scripting

    C. SQL Injection

    D. Browser Hacking

  • Question 384:

    When you are testing a web application, it is very useful to employ a proxy tool to save every request and response. You can manually test every request and analyze the response to find vulnerabilities. You can test parameter and headers manually to get more precise results than if using web vulnerability scanners.

    What proxy tool will help you find web vulnerabilities?

    A. Burpsuite

    B. Maskgen

    C. Dimitry

    D. Proxychains

  • Question 385:

    A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server.

    Based on this information, what should be one of your key recommendations to the bank?

    A. Place a front-end web server in a demilitarized zone that only handles external web traffic

    B. Require all employees to change their passwords immediately

    C. Move the financial data to another server on the same IP subnet

    D. Issue new certificates to the web servers from the root certificate authority

  • Question 386:

    It is a short-range wireless communication technology intended to replace the cables connecting portable of fixed devices while maintaining high levels of security. It allows mobile phones, computers and other devices to connect and communicate using a short- range wireless connection.

    Which of the following terms best matches the definition?

    A. Bluetooth

    B. Radio-Frequency Identification

    C. WLAN

    D. InfraRed

  • Question 387:

    Perspective clients want to see sample reports from previous penetration tests.

    What should you do next?

    A. Decline but, provide references.

    B. Share full reports, not redacted.

    C. Share full reports with redactions.

    D. Share reports, after NDA is signed.

  • Question 388:

    Which of the following is the least-likely physical characteristic to be used in biometric control that supports a large company?

    A. Height and Weight

    B. Voice

    C. Fingerprints

    D. Iris patterns

  • Question 389:

    This international organization regulates billions of transactions daily and provides security guidelines to protect personally identifiable information (PII). These security controls provide a baseline and prevent low-level hackers sometimes known as script kiddies from causing a data breach.

    Which of the following organizations is being described?

    A. Payment Card Industry (PCI)

    B. Center for Disease Control (CDC)

    C. Institute of Electrical and Electronics Engineers (IEEE)

    D. International Security Industry Organization (ISIO)

  • Question 390:

    Jesse receives an email with an attachment labeled "Court_Notice_21206.zip". Inside the zip file is a file named "Court_Notice_21206.docx.exe" disguised as a word document. Upon execution, a window appears stating, "This word document is corrupt." In the background, the file copies itself to Jesse APPDATA\local directory and begins to beacon to a C2 server to download additional malicious binaries.

    What type of malware has Jesse encountered?

    A. Trojan

    B. Worm

    C. Macro Virus

    D. Key-Logger

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.