Exam Details

  • Exam Code
    :312-50V10
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v10)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :747 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V10 Questions & Answers

  • Question 721:

    Which of the following act requires employer's standard national numbers to identify them on standard transactions?

    A. SOX

    B. HIPAA

    C. DMCA

    D. PCI-DSS

  • Question 722:

    Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a signature-based IDS?

    A. Produces less false positives

    B. Can identify unknown attacks

    C. Requires vendor updates for a new threat

    D. Cannot deal with encrypted network traffic

  • Question 723:

    Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students.

    He identified this when the IDS alerted for malware activities in the network.

    What should Bob do to avoid this problem?

    A. Disable unused ports in the switches

    B. Separate students in a different VLAN

    C. Use the 802.1x protocol

    D. Ask students to use the wireless network

  • Question 724:

    Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?

    A. SHA-2

    B. SHA-3

    C. SHA-1

    D. SHA-0

  • Question 725:

    Vlady works in a fishing company where the majority of the employees have very little understanding of IT let alone IT Security. Several information security issues that Vlady often found includes, employees sharing password, writing his/her password on a post it note and stick it to his/her desk, leaving the computer unlocked, didn't log out from emails or other social media accounts, and etc.

    After discussing with his boss, Vlady decided to make some changes to improve the security environment in his company. The first thing that Vlady wanted to do is to make the employees understand the importance of keeping confidential information, such as password, a secret and they should not share it with other persons.

    Which of the following steps should be the first thing that Vlady should do to make the employees in his company understand to importance of keeping confidential information a secret?

    A. Warning to those who write password on a post it note and put it on his/her desk

    B. Developing a strict information security policy

    C. Information security awareness training

    D. Conducting a one to one discussion with the other employees about the importance of information security

  • Question 726:

    You are a Penetration Tester and are assigned to scan a server. You need to use a scanning technique wherein the TCP Header is split into many packets so that it becomes difficult to detect what the packets are meant for. Which of the below scanning technique will you use?

    A. ACK flag scanning

    B. TCP Scanning

    C. IP Fragment Scanning

    D. Inverse TCP flag scanning

  • Question 727:

    Trinity needs to scan all hosts on a /16 network for TCP port 445 only. What is the fastest way she can accomplish this with Nmap? Stealth is not a concern.

    A. nmap -sn -sF 10.1.0.0/16 445

    B. nmap -p 445 -n -T4 –open 10.1.0.0/16

    C. nmap -s 445 -sU -T5 10.1.0.0/16

    D. nmap -p 445 –max -Pn 10.1.0.0/16

  • Question 728:

    You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet. What is the recommended architecture in terms of server placement?

    A. All three servers need to be placed internally

    B. A web server facing the Internet, an application server on the internal network, a database server on the internal network

    C. A web server and the database server facing the Internet, an application server on the internal network

    D. All three servers need to face the Internet so that they can communicate between themselves

  • Question 729:

    Which of the following program infects the system boot sector and the executable files at the same time?

    A. Stealth virus

    B. Polymorphic virus

    C. Macro virus

    D. Multipartite Virus

  • Question 730:

    The network team has well-established procedures to follow for creating new rules on the firewall. This includes having approval from a manager prior to implementing any new rules. While reviewing the firewall configuration, you notice a recently implemented rule but cannot locate manager approval for it. What would be a good step to have in the procedures for a situation like this?

    A. Have the network team document the reason why the rule was implemented without prior manager approval.

    B. Monitor all traffic using the firewall rule until a manager can approve it.

    C. Do not roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.

    D. Immediately roll back the firewall rule until a manager can approve it

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.