Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > EC-COUNCIL > EC-COUNCIL Certifications > 312-50V10 > 312-50V10 Online Practice Questions and Answers

312-50V10 Online Practice Questions and Answers

Questions 4

What is the best defense against privilege escalation vulnerability?

A. Patch systems regularly and upgrade interactive login privileges at the system administrator level.

B. Run administrator and applications on least privileges and use a content registry for tracking.

C. Run services with least privileged accounts and implement multi-factor authentication and authorization.

D. Review user roles and administrator privileges for maximum utilization of automation services.

Buy Now

Correct Answer: C

Questions 5

Firewalk has just completed the second phase (the scanning phase) and a technician receives the output shown below. What conclusions can be drawn based on these scan results?

A. The firewall itself is blocking ports 21 through 23 and a service is listening on port 23 of the target host.

B. The lack of response from ports 21 and 22 indicate that those services are not running on the destination server.

C. The scan on port 23 passed through the filtering device. This indicates that port 23 was not blocked at the firewall.

D. The scan on port 23 was able to make a connection to the destination host prompting the firewall to respond with a TTL error.

Buy Now

Correct Answer: C

Questions 6

What are the three types of compliance that the Open Source Security Testing Methodology Manual (OSSTMM) recognizes?

A. Legal, performance, audit

B. Audit, standards based, regulatory

C. Contractual, regulatory, industry

D. Legislative, contractual, standards based

Buy Now

Correct Answer: D

Questions 7

env x=`(){ :;};echo exploit` bash -c 'cat /etc/passwd' What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?

A. Display passwd content to prompt

B. Removes the passwd file

C. Changes all passwords in passwd

D. Add new user to the passwd file

Buy Now

Correct Answer: A

To extract private information, attackers are using a couple of techniques. The simplest extraction attacks are in the form: () {:;}; /bin/cat /etc/passwd That reads the password file /etc/passwd, and adds it to the response from the web server. So an attacker injecting this code through the Shellshock vulnerability would see the password file dumped out onto their screen as part of the web page returned.

References: https://blog.cloudflare.com/inside-shellshock/

Questions 8

An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up.

What is the most likely cause?

A. The network devices are not all synchronized.

B. Proper chain of custody was not observed while collecting the logs.

C. The attacker altered or erased events from the logs.

D. The security breach was a false positive.

Buy Now

Correct Answer: A

Time synchronization is an important middleware service of distributed systems, amongst which Distributed Intrusion Detection System (DIDS) makes extensive use of time synchronization in particular.

References: http://ieeexplore.ieee.org/xpl/login.jsp?tp=andarnumber=5619315andurl=http%3A%2F%2Fieee xplore.ieee.org %2Fxpls%2Fabs_all.jsp%3Farnumber%3D5619315

Questions 9

It is a widely used standard for message logging. It permits separation of the software that generates

messages, the system that stores them, and the software that reports and analyzes them. This protocol is

specifically designed for transporting event messages.

Which of the following is being described?

A. SNMP

B. ICMP

C. SYSLOG

D. SMS

Buy Now

Correct Answer: C

Questions 10

In which phase of the ethical hacking process can Google hacking be employed? This is a technique that involves manipulating a search string with specific operators to search for vulnerabilities.

Example: allintitle: root passwd

A. Maintaining Access

B. Gaining Access

C. Reconnaissance

D. Scanning and Enumeration

Buy Now

Correct Answer: C

Questions 11

Which DNS resource record can indicate how long any "DNS poisoning" could last?

A. MX

B. SOA

C. NS

D. TIMEOUT

Buy Now

Correct Answer: B

Questions 12

What is the proper response for a NULL scan if the port is closed?

A. SYN

B. ACK

C. FIN

D. PSH

E. RST F. No response

Buy Now

Correct Answer: E

Questions 13

Which of the following LM hashes represent a password of less than 8 characters? (Choose two.)

A. BA810DBA98995F1817306D272A9441BB

B. 44EFCE164AB921CQAAD3B435B51404EE

C. 0182BD0BD4444BF836077A718CCDF409

D. CEC52EB9C8E3455DC2265B23734E0DAC

E. B757BF5C0D87772FAAD3B435B51404EE

F. E52CAC67419A9A224A3B108F3FA6CB6D

Buy Now

Correct Answer: BE

Exam Code: 312-50V10
Exam Name: EC-Council Certified Ethical Hacker (C|EH v10)
Last Update: Jun 13, 2025
Questions: 747

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.