live chatMcAfee Secure sites help keep you safe from identity theft, credit card fraud, spyware, spam, viruses and online scams
Pass4Test 10%OFF Discount Code

EC-COUNCIL Certified Ethical Hacker Exam (CEH v10) - 312-50v10 Exam Questions

QUESTION NO: 1
Which of the following items is unique to the N-tier architecture method of designing software applications?
Correct Answer: B
QUESTION NO: 2
While performing online banking using a Web browser, a user receives an email that contains a link to an interesting Web site. When the user clicks on the link, another Web browser session starts and displays a video of cats playing a piano. The next business day, the user receives what looks like an email from his bank, indicating that his bank account has been accessed from a foreign country. The email asks the user to call his bank and verify the authorization of a funds transfer that took place.
What Web browser-based security vulnerability was exploited to compromise the user?
Correct Answer: D
Explanation: (Only visible to Pass4Test members)
QUESTION NO: 3
Which of the following is the most important phase of ethical hacking wherein you need to spend considerable amount of time?
Correct Answer: B
QUESTION NO: 4
While testing the company's web applications, a tester attempts to insert the following test script into the search area on the company's web site:
<script>alert(" Testing Testing Testing ")</script>
Afterwards, when the tester presses the search button, a pop-up box appears on the screen with the text:
"Testing Testing Testing". Which vulnerability has been detected in the web application?
Correct Answer: A
QUESTION NO: 5
Which of the following security operations is used for determining the attack surface of an organization?
Correct Answer: A
Explanation: (Only visible to Pass4Test members)
QUESTION NO: 6
A recently hired network security associate at a local bank was given the responsibility to perform daily scans of the internal network to look for unauthorized devices. The employee decides to write a script that will scan the network for unauthorized devices every morning at 5:00 am.
Which of the following programming languages would most likely be used?
Correct Answer: A
QUESTION NO: 7
Which of the following is an adaptive SQL Injection testing technique used to discover coding errors by inputting massive amounts of random data and observing the changes in the output?
Correct Answer: D
QUESTION NO: 8
Sandra is the security administrator of XYZ.com. One day she notices that the XYZ.com Oracle database server has been compromised and customer information along with financial data has been stolen. The financial loss will be estimated in millions of dollars if the database gets into the hands of competitors. Sandra wants to report this crime to the law enforcement agencies immediately. Which organization coordinates computer crime investigations throughout the United States?
Correct Answer: A
QUESTION NO: 9
A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing in concluding the Operating System (OS) version installed. Considering the NMAP result below, which of the following is likely to be installed on the target machine by the OS?
Correct Answer: D
Explanation: (Only visible to Pass4Test members)
QUESTION NO: 10
Why is a penetration test considered to be more thorough than vulnerability scan?
Correct Answer: A
QUESTION NO: 11
A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing in concluding the Operating System (OS) version installed. Considering the NMAP result below, which of the following is likely to be installed on the target machine by the OS?
Correct Answer: D
QUESTION NO: 12
Emil uses nmap to scan two hosts using this command.
nmap -sS -T4 -O 192.168.99.1 192.168.99.7
He receives this output:


What is his conclusion?
Correct Answer: D
QUESTION NO: 13
Study the following log extract and identify the attack.
Correct Answer: A
QUESTION NO: 14
An attacker runs netcat tool to transfer a secret file between two hosts.

He is worried about information being sniffed on the network.
How would the attacker use netcat to encrypt the information before transmitting onto the wire?
Correct Answer: A
QUESTION NO: 15
What is the approximate cost of replacement and recovery operation per year of a hard drive that has a value of $300 given that the technician who charges $10/hr would need 10 hours to restore OS and Software and needs further 4 hours to restore the database from the last backup to the new hard disk? Calculate the SLE, ARO, and ALE. Assume the EF = 1 (100%).
Correct Answer: C
QUESTION NO: 16
You have successfully gained access to your client's internal network and successfully comprised a Linux server which is part of the internal IP network. You want to know which Microsoft Windows workstations have file sharing enabled.
Which port would you see listening on these Windows machines in the network?
Correct Answer: A
Explanation: (Only visible to Pass4Test members)
QUESTION NO: 17
During a blackbox pen test you attempt to pass IRC traffic over port 80/TCP from a compromised web enabled host. The traffic gets blocked; however, outbound HTTP traffic is unimpeded.
What type of firewall is inspecting outbound traffic?
Correct Answer: D
Explanation: (Only visible to Pass4Test members)
QUESTION NO: 18
How can a policy help improve an employee's security awareness?
Correct Answer: B
QUESTION NO: 19
Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?
Correct Answer: B
QUESTION NO: 20
Jimmy is standing outside a secure entrance to a facility. He is pretending to have a tense conversation on his cell phone as an authorized employee badges in. Jimmy, while still on the phone, grabs the door as it begins to close.
What just happened?
Correct Answer: D
Explanation: (Only visible to Pass4Test members)
QUESTION NO: 21
What is the main security service a cryptographic hash provides?
Correct Answer: A
QUESTION NO: 22
What is the following command used for?
net use \targetipc$ "" /u:""
Correct Answer: D
QUESTION NO: 23
Smart cards use which protocol to transfer the certificate in a secure manner?
Correct Answer: C
QUESTION NO: 24
Which of the following is considered an acceptable option when managing a risk?
Correct Answer: C
QUESTION NO: 25
What is the name of the international standard that establishes a baseline level of confidence in the security functionality of IT products by providing a set of requirements for evaluation?
Correct Answer: B
QUESTION NO: 26
In Trojan terminology, what is a covert channel?
Correct Answer: C
QUESTION NO: 27
What network security concept requires multiple layers of security controls to be placed throughout an IT infrastructure, which improves the security posture of an organization to defend against malicious attacks or potential vulnerabilities?
Correct Answer: B
QUESTION NO: 28
Your next door neighbor, that you do not get along with, is having issues with their network, so he yells to his spouse the network's SSID and password and you hear them both clearly. What do you do with this information?
Correct Answer: B
QUESTION NO: 29
Jimmy is standing outside a secure entrance to a facility. He is pretending to have a tense conversation on his cell phone as an authorized employee badges in. Jimmy, while still on the phone, grabs the door as it begins to close.
What just happened?
Correct Answer: A
QUESTION NO: 30
Which of the following is a symmetric cryptographic standard?
Correct Answer: B
QUESTION NO: 31
Some clients of TPNQM SA were redirected to a malicious site when they tried to access the TPNQM main site. Bob, a system administrator at TPNQM SA, found that they were victims of DNS Cache Poisoning.
What should Bob recommend to deal with such a threat?
Correct Answer: C
QUESTION NO: 32
An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. The attacker can now use which cryptanalytic technique to attempt to discover the encryption key?
Correct Answer: D
QUESTION NO: 33
A company firewall engineer has configured a new DMZ to allow public systems to be located away from the internal network. The engineer has three security zones set:

The engineer wants to configure remote desktop access from a fixed IP on the remote network to a remote desktop server in the DMZ. Which rule would best fit this requirement?
Correct Answer: C
QUESTION NO: 34
On a Linux device, which of the following commands will start the Nessus client in the background so that the Nessus server can be configured?
Correct Answer: A
QUESTION NO: 35
Which of the following is a serious vulnerability in the popular OpenSSL cryptographic software library? This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet.
Correct Answer: D
QUESTION NO: 36
E-mail scams and mail fraud are regulated by which of the following?
Correct Answer: D
QUESTION NO: 37
You work as a Security Analyst for a retail organization. In securing the company's network, you set up a firewall and an IDS. However, hackers are able to attack the network. After investigating, you discover that your IDS is not configured properly and therefore is unable to trigger alarms when needed. What type of alert is the IDS giving?
Correct Answer: A
Explanation: (Only visible to Pass4Test members)
QUESTION NO: 38
An attacker scans a host with the below command. Which three flags are set? (Choose three.)
#nmap -sX host.domain.com
Correct Answer: D
QUESTION NO: 39
Bob is doing a password assessment for one of his clients. Bob suspects that security policies are not in place.
He also suspects that weak passwords are probably the norm throughout the company he is evaluating. Bob is familiar with password weaknesses and key loggers.
Which of the following options best represents the means that Bob can adopt to retrieve passwords from his clients hosts and servers?
Correct Answer: C
QUESTION NO: 40
International Organization for Standardization (ISO) standard 27002 provides guidance for compliance by outlining
Correct Answer: B
QUESTION NO: 41
While performing online banking using a Web browser, Kyle receives an email that contains an image of a well-crafted art. Upon clicking the image, a new tab on the web browser opens and shows an animated GIF of bills and coins being swallowed by a crocodile. After several days, Kyle noticed that all his funds on the bank was gone. What Web browser-based security vulnerability got exploited by the hacker?
Correct Answer: D
QUESTION NO: 42
Within the context of Computer Security, which of the following statements describes Social Engineering best?
Correct Answer: B
QUESTION NO: 43
Security Policy is a definition of what it means to be secure for a system, organization or other entity. For Information Technologies, there are sub-policies like Computer Security Policy, Information Protection Policy, Information Security Policy, network Security Policy, Physical Security Policy, Remote Access Policy, and User Account Policy.
What is the main theme of the sub-policies for Information Technologies?
Correct Answer: D
QUESTION NO: 44
Which of the following program infects the system boot sector and the executable files at the same time?
Correct Answer: C
QUESTION NO: 45
In order to prevent particular ports and applications from getting packets into an organization, what does a firewall check?
Correct Answer: C
QUESTION NO: 46
The security concept of "separation of duties" is most similar to the operation of which type of security device?
Correct Answer: C
Explanation: (Only visible to Pass4Test members)
QUESTION NO: 47
Your business has decided to add credit card numbers to the data it backs up to tape. Which of the following represents the best practice your business should observe?
Correct Answer: C
QUESTION NO: 48
What is the primary drawback to using advanced encryption standard (AES) algorithm with a 256 bit key to share sensitive data?
Correct Answer: D