Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > EC-COUNCIL > Certified Ethical Hacker > 312-50V7 > 312-50V7 Online Practice Questions and Answers

312-50V7 Online Practice Questions and Answers

Questions 4

More sophisticated IDSs look for common shellcode signatures. But even these systems can be bypassed, by using polymorphic shellcode. This is a technique common among virus writers ?it basically hides the true nature of the shellcode in different disguises.

How does a polymorphic shellcode work?

A. They encrypt the shellcode by XORing values over the shellcode, using loader code to decrypt the shellcode, and then executing the decrypted shellcode

B. They convert the shellcode into Unicode, using loader to convert back to machine code then executing them

C. They reverse the working instructions into opposite order by masking the IDS signatures

D. They compress shellcode into normal instructions, uncompress the shellcode using loader code and then executing the shellcode

Buy Now

Correct Answer: A

Questions 5

How do you defend against DHCP Starvation attack?

A. Enable ARP-Block on the switch

B. Enable DHCP snooping on the switch

C. Configure DHCP-BLOCK to 1 on the switch

D. Install DHCP filters on the switch to block this attack

Buy Now

Correct Answer: B

Questions 6

This is an example of whois record.

Sometimes a company shares a little too much information on their organization through public domain records. Based on the above whois record, what can an attacker do? (Select 2 answers)

A. Search engines like Google, Bing will expose information listed on the WHOIS record

B. An attacker can attempt phishing and social engineering on targeted individuals using the information from WHOIS record

C. Spammers can send unsolicited e-mails to addresses listed in the WHOIS record

D. IRS Agents will use this information to track individuals using the WHOIS record information

Buy Now

Correct Answer: BC

Questions 7

In order to show improvement of security over time, what must be developed?

A. Reports

B. Testing tools

C. Metrics

D. Taxonomy of vulnerabilities

Buy Now

Correct Answer: C

Questions 8

Which of the following scanning tools is specifically designed to find potential exploits in Microsoft Windows products?

A. Microsoft Security Baseline Analyzer

B. Retina

C. Core Impact

D. Microsoft Baseline Security Analyzer

Buy Now

Correct Answer: D

Questions 9

A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing in concluding the Operating System (OS) version installed. Considering the NMAP result below, which of the following is likely to be installed on the target machine by the OS?

Starting NMAP 5.21 at 2011-03-15 11:06 NMAP scan report for 172.16.40.65 Host is up (1.00s latency). Not shown: 993 closed ports PORT STATE SERVICE 21/tcp open ftp 23/tcp open telnet 80/tcp open http 139/tcp open netbios-ssn 515/tcp open 631/tcp open ipp 9100/tcp open MAC Address: 00:00:48:0D:EE:89

A. The host is likely a Windows machine.

B. The host is likely a Linux machine.

C. The host is likely a router.

D. The host is likely a printer.

Buy Now

Correct Answer: D

Questions 10

Which element of Public Key Infrastructure (PKI) verifies the applicant?

A. Certificate authority

B. Validation authority

C. Registration authority

D. Verification authority

Buy Now

Correct Answer: C

Questions 11

Which of the following tools would be the best choice for achieving compliance with PCI Requirement 11?

A. Truecrypt

B. Sub7

C. Nessus

D. Clamwin

Buy Now

Correct Answer: C

Questions 12

The precaution of prohibiting employees from bringing personal computing devices into a facility is what type of security control?

A. Physical

B. Procedural

C. Technical

D. Compliance

Buy Now

Correct Answer: B

Questions 13

A Certificate Authority (CA) generates a key pair that will be used for encryption and decryption of email. The integrity of the encrypted email is dependent on the security of which of the following?

A. Public key

B. Private key

C. Modulus length

D. Email server certificate

Buy Now

Correct Answer: B

Exam Code: 312-50V7
Exam Name: Ethical Hacking and Countermeasures (CEHv7)
Last Update: Jun 11, 2025
Questions: 514

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.