Download Certified Ethical Hacker (312-50v9).312-50.ActualTests.2022-02-23.440q.vcex

Vendor: ECCouncil
Exam Code: 312-50
Exam Name: Certified Ethical Hacker (312-50v9)
Date: Feb 23, 2022
File Size: 397 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?
  1. Fast processor to help with network traffic analysis
  2. They must be dual-homed
  3. Similar RAM requirements
  4. Fast network interface cards
Correct answer: B
Explanation:
Dual-homed or dual-homing can refer to either an Ethernet device that has more than one network interface, for redundancy purposes, or in firewall technology, dual-homed is one of the firewall architectures, such as an IDS/IPS system, for implementing preventive security.   References: https://en.wikipedia.org/wiki/Dual-homed
Dual-homed or dual-homing can refer to either an Ethernet device that has more than one network interface, for redundancy purposes, or in firewall technology, dual-homed is one of the firewall architectures, such as an IDS/IPS system, for implementing preventive security. 
  
References: https://en.wikipedia.org/wiki/Dual-homed
Question 2
Which of the following is an application that requires a host application for replication?
  1. Micro
  2. Worm
  3. Trojan
  4. Virus 
Correct answer: D
Explanation:
Computer viruses infect a variety of different subsystems on their hosts. A computer virus is a malware that, when executed, replicates by reproducing it self or infecting other programs by modifying them. Infecting computer programs can include as well, data files, or the boot sector of the hard drive. When this replication succeeds, the affected areas are then said to be "infected".     References: https://en.wikipedia.org/wiki/Computer_virus
Computer viruses infect a variety of different subsystems on their hosts. A computer virus is a malware that, when executed, replicates by reproducing it self or infecting other programs by modifying them. Infecting computer programs can include as well, data files, or the boot sector of the hard drive. When this replication succeeds, the affected areas are then said to be "infected".   
  
References: https://en.wikipedia.org/wiki/Computer_virus
Question 3
A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?
  1. Paros Proxy
  2. BBProxy
  3. BBCrack
  4. Blooover
Correct answer: B
Explanation:
Blackberry users warned of hacking tool threat.   Users have been warned that the security of Blackberry wireless e-mail devices is at risk due to the availability this week of a new hacking tool. Secure Computing Corporation said businesses that have installed Blackberry servers behind their gateway security devices could be vulnerable to a hacking attack from a tool call BBProxy.   References: http://www.computerweekly.com/news/2240062112/Technology-news-in-brief
Blackberry users warned of hacking tool threat. 
  
Users have been warned that the security of Blackberry wireless e-mail devices is at risk due to the availability this week of a new hacking tool. Secure Computing Corporation said businesses that have installed Blackberry servers behind their gateway security devices could be vulnerable to a hacking attack from a tool call BBProxy. 
  
References: http://www.computerweekly.com/news/2240062112/Technology-news-in-brief
Question 4
Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?
  1. Restore a random file.
  2. Perform a full restore.
  3. Read the first 512 bytes of the tape.
  4. Read the last 512 bytes of the tape.
Correct answer: B
Explanation:
A full restore is required.
A full restore is required.
Question 5
Which of the following describes the characteristics of a Boot Sector Virus?
  1. Moves the MBR to another location on the RAM and copies itself to the original location of the MBR
  2. Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR
  3. Modifies directory table entries so that directory entries point to the virus code instead of the actual program
  4. Overwrites the original MBR and only executes the new virus code
Correct answer: B
Explanation:
A boot sector virus is a computer virus that infects a storage device's master boot record (MBR). The virus moves the boot sector to another location on the hard drive.   References: https://www.techopedia.com/definition/26655/boot-sector-virus
A boot sector virus is a computer virus that infects a storage device's master boot record (MBR). 
The virus moves the boot sector to another location on the hard drive. 
  
References: https://www.techopedia.com/definition/26655/boot-sector-virus
Question 6
Which statement is TRUE regarding network firewalls preventing Web Application attacks?
  1. Network firewalls can prevent attacks because they can detect malicious HTTP traffic.
  2. Network firewalls cannot prevent attacks because ports 80 and 443 must be opened.
  3. Network firewalls can prevent attacks if they are properly configured.
  4. Network firewalls cannot prevent attacks because they are too complex to configure.
Correct answer: B
Explanation:
Network layer firewalls, also called packet filters, operate at a relatively low level of the TCP/IP protocol stack, not allowing packets to pass through the firewall unless they match the established rule set. To prevent Web Application attacks an Application layer firewall would be required.     References: https://en.wikipedia.org/wiki/Firewall_(computing)#Network_layer_or_packet_filters
Network layer firewalls, also called packet filters, operate at a relatively low level of the TCP/IP protocol stack, not allowing packets to pass through the firewall unless they match the established rule set. To prevent Web Application attacks an Application layer firewall would be required.   
  
References: https://en.wikipedia.org/wiki/Firewall_(computing)#Network_layer_or_packet_filters
Question 7
Which of the following programs is usually targeted at Microsoft Office products?
  1. Polymorphic virus
  2. Multipart virus
  3. Macro virus
  4. Stealth virus
Correct answer: C
Explanation:
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications). Some applications, such as Microsoft Office, allow macro programs to be embedded in documents such that the macros are run automatically when the document is opened, and this provides a distinct mechanism by which malicious computer instructions can spread.   References: https://en.wikipedia.org/wiki/Macro_virus
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications). 
Some applications, such as Microsoft Office, allow macro programs to be embedded in documents such that the macros are run automatically when the document is opened, and this provides a distinct mechanism by which malicious computer instructions can spread. 
  
References: https://en.wikipedia.org/wiki/Macro_virus
Question 8
Bluetooth uses which digital modulation technique to exchange information between paired devices?
  1. PSK (phase-shift keying)
  2. FSK (frequency-shift keying)
  3. ASK (amplitude-shift keying)
  4. QAM (quadrature amplitude modulation)
Correct answer: A
Explanation:
Phase shift keying is the form of Bluetooth modulation used to enable the higher data rates achievable with Bluetooth 2 EDR (Enhanced Data Rate). Two forms of PSK are used: /4 DQPSK, and 8DPSK.   References: http://www.radio-electronics.com/info/wireless/bluetooth/radio-interface-modulation.php 
Phase shift keying is the form of Bluetooth modulation used to enable the higher data rates achievable with Bluetooth 2 EDR (Enhanced Data Rate). Two forms of PSK are used: /4 DQPSK, and 8DPSK. 
  
References: http://www.radio-electronics.com/info/wireless/bluetooth/radio-interface-modulation.php 
Question 9
In order to show improvement of security over time, what must be developed?
  1. Reports
  2. Testing tools
  3. Metrics
  4. Taxonomy of vulnerabilities
Correct answer: C
Explanation:
Today, management demands metrics to get a clearer view of security.   Metrics that measure participation, effectiveness, and window of exposure, however, offer information the organization can use to make plans and improve programs.     References: http://www.infoworld.com/article/2974642/security/4-security-metrics-that-matter.html
Today, management demands metrics to get a clearer view of security.   
Metrics that measure participation, effectiveness, and window of exposure, however, offer information the organization can use to make plans and improve programs.   
  
References: http://www.infoworld.com/article/2974642/security/4-security-metrics-that-matter.html
Question 10
Passive reconnaissance involves collecting information through which of the following?
  1. Social engineering
  2. Network traffic sniffing
  3. Man in the middle attacks
  4. Publicly accessible sources
Correct answer: D
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!