Exam Details

  • Exam Code
    :312-50V8
  • Exam Name
    :Certified Ethical Hacker v8
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :1008 Q&As
  • Last Updated
    :Apr 15, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V8 Questions & Answers

  • Question 561:

    The precaution of prohibiting employees from bringing personal computing devices into a facility is what type of security control?

    A. Physical

    B. Procedural

    C. Technical

    D. Compliance

  • Question 562:

    A botnet can be managed through which of the following?

    A. IRC

    B. E-Mail

    C. Linkedin and Facebook

    D. A vulnerable FTP server

  • Question 563:

    Which of the following describes the characteristics of a Boot Sector Virus?

    A. Moves the MBR to another location on the RAM and copies itself to the original location of the MBR

    B. Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR

    C. Modifies directory table entries so that directory entries point to the virus code instead of the actual program

    D. Overwrites the original MBR and only executes the new virus code

  • Question 564:

    Which of the following is a preventive control?

    A. Smart card authentication

    B. Security policy

    C. Audit trail

    D. Continuity of operations plan

  • Question 565:

    Which of the following techniques does a vulnerability scanner use in order to detect a vulnerability on a target service?

    A. Port scanning

    B. Banner grabbing

    C. Injecting arbitrary data

    D. Analyzing service response

  • Question 566:

    The Open Web Application Security Project (OWASP) testing methodology addresses the need to secure web applications by providing which one of the following services?

    A. An extensible security framework named COBIT

    B. A list of flaws and how to fix them

    C. Web application patches

    D. A security certification for hardened web applications

  • Question 567:

    Which of the following network attacks relies on sending an abnormally large packet size that exceeds TCP/IP specifications?

    A. Ping of death

    B. SYN flooding

    C. TCP hijacking

    D. Smurf attack

  • Question 568:

    Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?

    A. Cavity virus

    B. Polymorphic virus

    C. Tunneling virus

    D. Stealth virus

  • Question 569:

    Which cipher encrypts the plain text digit (bit or byte) one by one?

    A. Classical cipher

    B. Block cipher

    C. Modern cipher

    D. Stream cipher

  • Question 570:

    WPA2 uses AES for wireless data encryption at which of the following encryption levels?

    A. 64 bit and CCMP

    B. 128 bit and CRC

    C. 128 bit and CCMP

    D. 128 bit and TKIP

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V8 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.