Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

312-50 Certified Ethical Hacker Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

312-50 Practice Questions

Certified Ethical Hacker Exam

Last Update 1 day ago
Total Questions : 614

Dive into our fully updated and stable 312-50 practice test platform, featuring all the latest Certified Ethical Hacker exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free Certified Ethical Hacker practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 312-50. Use this test to pinpoint which areas you need to focus your study on.

312-50 PDF

312-50 PDF (Printable)
$43.75
$124.99

312-50 Testing Engine

312-50 PDF (Printable)
$50.75
$144.99

312-50 PDF + Testing Engine

312-50 PDF (Printable)
$63.7
$181.99
Question # 11

The following is part of a log file taken from the machine on the network with the IP address of 192.168.1.106:

Question # 11

What type of activity has been logged?

Options:

A.  

Port scan targeting 192.168.1.103

B.  

Teardrop attack targeting 192.168.1.106

C.  

Denial of service attack targeting 192.168.1.103

D.  

Port scan targeting 192.168.1.106

Discussion 0
Question # 12

A penetration tester is hired to do a risk assessment of a company's DMZ. The rules of engagement states that the penetration test be done from an external IP address with no prior knowledge of the internal IT systems. What kind of test is being performed?

Options:

A.  

white box

B.  

grey box

C.  

red box

D.  

black box

Discussion 0
Question # 13

A consultant has been hired by the V.P. of a large financial organization to assess the company's security posture. During the security testing, the consultant comes across child pornography on the V.P.'s computer. What is the consultant's obligation to the financial organization?

Options:

A.  

Say nothing and continue with the security testing.

B.  

Stop work immediately and contact the authorities.

C.  

Delete the pornography, say nothing, and continue security testing.

D.  

Bring the discovery to the financial organization's human resource department.

Discussion 0
Question # 14

Which initial procedure should an ethical hacker perform after being brought into an organization?

Options:

A.  

Begin security testing.

B.  

Turn over deliverables.

C.  

Sign a formal contract with non-disclosure.

D.  

Assess what the organization is trying to protect.

Discussion 0
Question # 15

A computer technician is using a new version of a word processing software package when it is discovered that a special sequence of characters causes the entire computer to crash. The technician researches the bug and discovers that no one else experienced the problem. What is the appropriate next step?

Options:

A.  

Ignore the problem completely and let someone else deal with it.

B.  

Create a document that will crash the computer when opened and send it to friends.

C.  

Find an underground bulletin board and attempt to sell the bug to the highest bidder.

D.  

Notify the vendor of the bug and do not disclose it until the vendor gets a chance to issue a fix.

Discussion 0
Question # 16

A certified ethical hacker (CEH) completed a penetration test of the main headquarters of a company almost two months ago, but has yet to get paid. The customer is suffering from financial problems, and the CEH is worried that the company will go out of business and end up not paying. What actions should the CEH take?

Options:

A.  

Threaten to publish the penetration test results if not paid.

B.  

Follow proper legal procedures against the company to request payment.

C.  

Tell other customers of the financial problems with payments from this company.

D.  

Exploit some of the vulnerabilities found on the company webserver to deface it.

Discussion 0
Question # 17

A certified ethical hacker (CEH) is approached by a friend who believes her husband is cheating. She offers to pay to break into her husband's email account in order to find proof so she can take him to court. What is the ethical response?

Options:

A.  

Say no; the friend is not the owner of the account.

B.  

Say yes; the friend needs help to gather evidence.

C.  

Say yes; do the job for free.

D.  

Say no; make sure that the friend knows the risk she’s asking the CEH to take.

Discussion 0
Question # 18

An ethical hacker for a large security research firm performs penetration tests, vulnerability tests, and risk assessments. A friend recently started a company and asks the hacker to perform a penetration test and vulnerability assessment of the new company as a favor. What should the hacker's next step be before starting work on this job?

Options:

A.  

Start by foot printing the network and mapping out a plan of attack.

B.  

Ask the employer for authorization to perform the work outside the company.

C.  

Begin the reconnaissance phase with passive information gathering and then move into active information gathering.

D.  

Use social engineering techniques on the friend's employees to help identify areas that may be susceptible to attack.

Discussion 0
Question # 19

A hacker is attempting to see which IP addresses are currently active on a network. Which NMAP switch would the hacker use?

Options:

A.  

-sO

B.  

-sP

C.  

-sS

D.  

-sU

Discussion 0
Question # 20

How does an operating system protect the passwords used for account logins?

Options:

A.  

The operating system performs a one-way hash of the passwords.

B.  

The operating system stores the passwords in a secret file that users cannot find.

C.  

The operating system encrypts the passwords, and decrypts them when needed.

D.  

The operating system stores all passwords in a protected segment of non-volatile memory.

Discussion 0
Get 312-50 dumps and pass your exam in 24 hours!

Free Exams Sample Questions