Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

312-50 Certified Ethical Hacker Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

312-50 Practice Questions

Certified Ethical Hacker Exam

Last Update 1 day ago
Total Questions : 614

Dive into our fully updated and stable 312-50 practice test platform, featuring all the latest Certified Ethical Hacker exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free Certified Ethical Hacker practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 312-50. Use this test to pinpoint which areas you need to focus your study on.

312-50 PDF

312-50 PDF (Printable)
$43.75
$124.99

312-50 Testing Engine

312-50 PDF (Printable)
$50.75
$144.99

312-50 PDF + Testing Engine

312-50 PDF (Printable)
$63.7
$181.99
Question # 21

Fingerprinting VPN firewalls is possible with which of the following tools?

Options:

A.  

Angry IP

B.  

Nikto

C.  

Ike-scan

D.  

Arp-scan

Discussion 0
Question # 22

Which of the following programming languages is most vulnerable to buffer overflow attacks?

Options:

A.  

Perl

B.  

C++

C.  

Python

D.  

Java

Discussion 0
Question # 23

What is the outcome of the comm”nc -l -p 2222 | nc 10.1.0.43 1234"?

Options:

A.  

Netcat will listen on the 10.1.0.43 interface for 1234 seconds on port 2222.

B.  

Netcat will listen on port 2222 and output anything received to a remote connection on 10.1.0.43 port 1234.

C.  

Netcat will listen for a connection from 10.1.0.43 on port 1234 and output anything received to port 2222.

D.  

Netcat will listen on port 2222 and then output anything received to local interface 10.1.0.43.

Discussion 0
Question # 24

A hacker is attempting to use nslookup to query Domain Name Service (DNS). The hacker uses the nslookup interactive mode for the search. Which command should the hacker type into the command shell to request the appropriate records?

Options:

A.  

Locate type=ns

B.  

Request type=ns

C.  

Set type=ns

D.  

Transfer type=ns

Discussion 0
Question # 25

Which type of access control is used on a router or firewall to limit network activity?

Options:

A.  

Mandatory

B.  

Discretionary

C.  

Rule-based

D.  

Role-based

Discussion 0
Question # 26

Which type of scan measures a person's external features through a digital video camera?

Options:

A.  

Iris scan

B.  

Retinal scan

C.  

Facial recognition scan

D.  

Signature kinetics scan

Discussion 0
Question # 27

Which of the following techniques does a vulnerability scanner use in order to detect a vulnerability on a target service?

Options:

A.  

Port scanning

B.  

Banner grabbing

C.  

Injecting arbitrary data

D.  

Analyzing service response

Discussion 0
Question # 28

What is the main advantage that a network-based IDS/IPS system has over a host-based solution?

Options:

A.  

They do not use host system resources.

B.  

They are placed at the boundary, allowing them to inspect all traffic.

C.  

They are easier to install and configure.

D.  

They will not interfere with user interfaces.

Discussion 0
Question # 29

A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted.

Which cryptography attack is the student attempting?

Options:

A.  

Man-in-the-middle attack

B.  

Brute-force attack

C.  

Dictionary attack

D.  

Session hijacking

Discussion 0
Question # 30

The network administrator for a company is setting up a website with e-commerce capabilities. Packet sniffing is a concern because credit card information will be sent electronically over the Internet. Customers visiting the site will need to encrypt the data with HTTPS. Which type of certificate is used to encrypt and decrypt the data?

Options:

A.  

Asymmetric

B.  

Confidential

C.  

Symmetric

D.  

Non-confidential

Discussion 0
Get 312-50 dumps and pass your exam in 24 hours!

Free Exams Sample Questions