Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

312-50 Certified Ethical Hacker Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

312-50 Practice Questions

Certified Ethical Hacker Exam

Last Update 1 day ago
Total Questions : 614

Dive into our fully updated and stable 312-50 practice test platform, featuring all the latest Certified Ethical Hacker exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free Certified Ethical Hacker practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 312-50. Use this test to pinpoint which areas you need to focus your study on.

312-50 PDF

312-50 PDF (Printable)
$43.75
$124.99

312-50 Testing Engine

312-50 PDF (Printable)
$50.75
$144.99

312-50 PDF + Testing Engine

312-50 PDF (Printable)
$63.7
$181.99
Question # 31

In the software security development life cycle process, threat modeling occurs in which phase?

Options:

A.  

Design

B.  

Requirements

C.  

Verification

D.  

Implementation

Discussion 0
Question # 32

What is the name of the international standard that establishes a baseline level of confidence in the security functionality of IT products by providing a set of requirements for evaluation?

Options:

A.  

Blue Book

B.  

ISO 26029

C.  

Common Criteria

D.  

The Wassenaar Agreement

Discussion 0
Question # 33

Which of the following conditions must be given to allow a tester to exploit a Cross-Site Request Forgery (CSRF) vulnerable web application?

Options:

A.  

The victim user must open the malicious link with an Internet Explorer prior to version 8.

B.  

The session cookies generated by the application do not have the HttpOnly flag set.

C.  

The victim user must open the malicious link with a Firefox prior to version 3.

D.  

The web application should not use random tokens.

Discussion 0
Question # 34

The precaution of prohibiting employees from bringing personal computing devices into a facility is what type of security control?

Options:

A.  

Physical

B.  

Procedural

C.  

Technical

D.  

Compliance

Discussion 0
Question # 35

During a penetration test, a tester finds that the web application being analyzed is vulnerable to Cross Site Scripting (XSS). Which of the following conditions must be met to exploit this vulnerability?

Options:

A.  

The web application does not have the secure flag set.

B.  

The session cookies do not have the HttpOnly flag set.

C.  

The victim user should not have an endpoint security solution.

D.  

The victim's browser must have ActiveX technology enabled.

Discussion 0
Question # 36

A newly discovered flaw in a software application would be considered which kind of security vulnerability?

Options:

A.  

Input validation flaw

B.  

HTTP header injection vulnerability

C.  

0-day vulnerability

D.  

Time-to-check to time-to-use flaw

Discussion 0
Question # 37

What would you type on the Windows command line in order to launch the Computer Management Console provided that you are logged in as an admin?

Options:

A.  

c:\compmgmt.msc

B.  

c:\gpedit

C.  

c:\ncpa.cpl

D.  

c:\services.msc

Discussion 0
Question # 38

Windows LAN Manager (LM) hashes are known to be weak.

Which of the following are known weaknesses of LM? (Choose three.)

Options:

A.  

Converts passwords to uppercase.

B.  

Hashes are sent in clear text over the network.

C.  

Makes use of only 32-bit encryption.

D.  

Effective length is 7 characters.

Discussion 0
Question # 39

A possibly malicious sequence of packets that were sent to a web server has been captured by an Intrusion Detection System (IDS) and was saved to a PCAP file. As a network administrator, you need to determine whether this packets are indeed malicious. What tool are you going to use?

Options:

A.  

Intrusion Prevention System (IPS)

B.  

Vulnerability scanner

C.  

Protocol analyzer

D.  

Network sniffer

Discussion 0
Question # 40

Which of the following is the least-likely physical characteristic to be used in biometric control that supports a large company?

Options:

A.  

Height and Weight

B.  

Voice

C.  

Fingerprints

D.  

Iris patterns

Discussion 0
Get 312-50 dumps and pass your exam in 24 hours!

Free Exams Sample Questions