Download Certified Ethical Hacker Exam.ActualTests.312-50.2022-01-12.5e.343q.vcex

Download Exam

File Info

Exam Certified Ethical Hacker (312-50v9)
Number 312-50
File Name Certified Ethical Hacker Exam.ActualTests.312-50.2022-01-12.5e.343q.vcex
Size 302 Kb
Posted January 12, 2022
Downloads 17

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

 
 



Demo Questions

Question 1
Passive reconnaissance involves collecting information through which of the following?

  • A: Social engineering
  • B: Network traffic sniffing
  • C: Man in the middle attacks
  • D: Publicly accessible sources



Question 2
How can rainbow tables be defeated?

  • A: Password salting
  • B: Use of non-dictionary words
  • C: All uppercase character passwords
  • D: Lockout accounts under brute force password cracking attempts



Question 3
An NMAP scan of a server shows port 25 is open. What risk could this pose?

  • A: Open printer sharing
  • B: Web portal data leak
  • C: Clear text authentication
  • D: Active mail relay



Question 4
What type of OS fingerprinting technique sends specially crafted packets to the remote OS and analyzes the received response?

  • A: Passive 
  • B: Reflective
  • C: Active
  • D: Distributive



Question 5
Which of the following is a detective control?

  • A: Smart card authentication
  • B: Security policy
  • C: Audit trail
  • D: Continuity of operations plan



Question 6
When utilizing technical assessment methods to assess the security posture of a network, which of the following techniques would be most effective in determining whether end-user security training would be beneficial?

  • A: Vulnerability scanning
  • B: Social engineering
  • C: Application security testing
  • D: Network sniffing



Question 7
A company has publicly hosted web applications and an internal Intranet protected by a firewall. 
Which technique will help protect against enumeration?

  • A: Reject all invalid email received via SMTP.
  • B: Allow full DNS zone transfers.
  • C: Remove A records for internal hosts.
  • D: Enable null session pipes.



Question 8
Which of the following techniques will identify if computer files have been changed?

  • A: Network sniffing
  • B: Permission sets
  • C: Integrity checking hashes
  • D: Firewall alerts



Question 9
Which system consists of a publicly available set of databases that contain domain name registration contact information?

  • A: WHOIS
  • B: IANA
  • C: CAPTCHA 
  • D: IETF



Question 10
The following is part of a log file taken from the machine on the network with the IP address of 192.168.1.106:
    
Time:Mar 13 17:30:15 Port:20 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP  
Time:Mar 13 17:30:17 Port:21 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP  
Time:Mar 13 17:30:19 Port:22 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP  
Time:Mar 13 17:30:21 Port:23 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP  
Time:Mar 13 17:30:22 Port:25 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP  
Time:Mar 13 17:30:23 Port:80 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP  
Time:Mar 13 17:30:30 Port:443 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP
    
What type of activity has been logged?

  • A: Port scan targeting 192.168.1.103
  • B: Teardrop attack targeting 192.168.1.106
  • C: Denial of service attack targeting 192.168.1.103
  • D: Port scan targeting 192.168.1.106






CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset