Exam Details

  • Exam Code
    :312-50V10
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v10)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :747 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V10 Questions & Answers

  • Question 711:

    Which of the following statements is TRUE?

    A. Sniffers operate on Layer 2 of the OSI model

    B. Sniffers operate on Layer 3 of the OSI model

    C. Sniffers operate on both Layer 2 and Layer 3 of the OSI model.

    D. Sniffers operate on the Layer 1 of the OSI model.

  • Question 712:

    You are working as a Security Analyst in a company XYZ that owns the whole subnet range of 23.0.0.0/8 and 192.168.0.0/8.

    While monitoring the data, you find a high number of outbound connections. You see that IP's owned by XYZ (Internal) and private IP's are communicating to a Single Public IP. Therefore, the Internal IP's are sending data to the Public IP.

    After further analysis, you find out that this Public IP is a blacklisted IP, and the internal communicating devices are compromised.

    What kind of attack does the above scenario depict?

    A. Botnet Attack

    B. Spear Phishing Attack

    C. Advanced Persistent Threats D. Rootkit Attack

  • Question 713:

    Developers at your company are creating a web application which will be available for use by anyone on the Internet, The developers have taken the approach of implementing a Three-Tier Architecture for the web application. The developers are now asking you which network should the Presentation Tier (frontend web server) be placed in?

    A. isolated vlan network

    B. Mesh network

    C. DMZ network

    D. Internal network

  • Question 714:

    Which of the below hashing functions are not recommended for use?

    A. SHA-1.ECC

    B. MD5, SHA-1

    C. SHA-2. SHA-3

    D. MD5. SHA-5

  • Question 715:

    The Payment Card Industry Data Security Standard (PCI DSS) contains six different categories of control objectives. Each objective contains one or more requirements, which must be followed in order to achieve compliance. Which of the following requirements would best fit under the objective, "Implement strong access control measures"?

    A. Regularly test security systems and processes.

    B. Encrypt transmission of cardholder data across open, public networks.

    C. Assign a unique ID to each person with computer access.

    D. Use and regularly update anti-virus software on all systems commonly affected by malware.

  • Question 716:

    What is the main security service a cryptographic hash provides?

    A. Integrity and ease of computation

    B. Message authentication and collision resistance

    C. Integrity and collision resistance

    D. Integrity and computational in-feasibility

  • Question 717:

    In which of the following cryptography attack methods, the attacker makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions?

    A. Chosen-plaintext attack

    B. Ciphertext-only attack

    C. Adaptive chosen-plaintext attack

    D. Known-plaintext attack

  • Question 718:

    Which of the following is the best countermeasure to encrypting ransomwares?

    A. Use multiple antivirus softwares

    B. Keep some generation of off-line backup

    C. Analyze the ransomware to get decryption key of encrypted data

    D. Pay a ransom

  • Question 719:

    Darius is analysing logs from IDS. He want to understand what have triggered one alert and verify if it's true positive or false positive. Looking at the logs he copy and paste basic details like below: source IP: 192.168.21.100 source port: 80 destination IP: 192.168.10.23 destination port: 63221 What is the most proper answer.

    A. This is most probably true negative.

    B. This is most probably true positive which triggered on secure communication between client and server.

    C. This is most probably false-positive, because an alert triggered on reversed traffic.

    D. This is most probably false-positive because IDS is monitoring one direction traffic.

  • Question 720:

    What is the minimum number of network connections in a multi homed firewall?

    A. 3

    B. 5

    C. 4

    D. 2

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.