Pass4itsure shares a valid dump to help pass the ECCouncil 312-50V10 exam! The latest ECCouncil 312-50V10 VCE dumps and ECCouncil 312-50V10 PDF dumps, Pass4itsure ECCouncil 312-50V10 exam questions have been updated https://www.pass4itsure.com/312-50v10.html (747 Q&As Dumps)
Share free ECCouncil 312-50V10 exam tips questions and dumps – Pass4itsure
Free ECCouncil 312-50V10 exam pdf dumps download from Google Drive
[q1-q13, free pdf] ECCouncil 312-50V10 exam pdf dumps https://drive.google.com/file/d/1C9FEe7ay0yaqGiJ_RQ6kZoosHJ2krUgd/view?usp=sharing
Practice ECCouncil 312-50V10 exam question 1-13
QUESTION 1
You\\’ve just been hired to perform a pen test on an organization that has been subjected to a large-scale attack. The
CIO is concerned with mitigating threats and vulnerabilities to totally eliminate risk. What is one of the first things you
should do when given the job?
A. Explain to the CIO that you cannot eliminate all risk, but you will be able to reduce risk to acceptable levels.
B. Interview all employees in the company to rule out possible insider threats.
C. Establish attribution to suspected attackers.
D. Start the wireshark application to start sniffing network traffic.
Correct Answer: A
The goals of penetration tests are:
References: https://en.wikipedia.org/wiki/Penetration_test
QUESTION 2
Why would you consider sending an email to an address that you know does not exist within the company you are
performing a Penetration Test for?
A. To determine who is the holder of the root account
B. To perform a DoS
C. To create needless SPAM
D. To illicit a response back that will reveal information about email servers and how they treat undeliverable mail
E. To test for virus protection
Correct Answer: D
QUESTION 3
Your company was hired by a small healthcare provider to perform a technical assessment on the network. What is the
best approach for discovering vulnerabilities on a Windows-based computer?
A. Use a scan tool like Nessus
B. Use the built-in Windows Update tool
C. Check MITRE.org for the latest list of CVE findings
D. Create a disk image of a clean Windows installation
Correct Answer: A
Nessus is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures
architecture for easy cross-linking between compliant security tools.
The Nessus server is currently available for Unix, Linux and FreeBSD. The client is available for Unix- or Windowsbased operating systems. Note: Significant capabilities of Nessus include:
References: http://searchnetworking.techtarget.com/definition/Nessus
QUESTION 4
A recently hired network security associate at a local bank was given the responsibility to perform daily scans of the
internal network to look for unauthorized devices. The employee decides to write a script that will scan the network for
unauthorized devices every morning at 5:00 am.
Which of the following programming languages would most likely be used?
A. PHP
B. C#
C. Python
D. ASP.NET
Correct Answer: C
QUESTION 5
The “gray box testing” methodology enforces what kind of restriction?
A. The internal operation of a system is only partly accessible to the tester.
B. The internal operation of a system is completely known to the tester.
C. Only the external operation of a system is accessible to the tester.
D. Only the internal operation of a system is known to the tester.
Correct Answer: A
A black-box tester is unaware of the internal structure of the application to be tested, while a white-box tester has
access to the internal structure of the application. A gray-box tester partially knows the internal structure, which includes
access to the documentation of internal data structures as well as the algorithms used. References:
https://en.wikipedia.org/wiki/Gray_box_testing
QUESTION 6
When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host
and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of
the SYN/ACK before the connection is established. This is referred to as the “TCP three-way handshake.” While waiting
for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds
after the SYN ACK.
How would an attacker exploit this design by launching TCP SYN attack?
A. Attacker generates TCP SYN packets with random destination addresses towards a victim host
B. Attacker floods TCP SYN packets with random source addresses towards a victim host
C. Attacker generates TCP ACK packets with random source addresses towards a victim host
D. Attacker generates TCP RST packets with random source addresses towards a victim host
Correct Answer: B
QUESTION 7
Least privilege is a security concept that requires that a user is:
A. limited to those functions required to do the job.
B. given root or administrative privileges.
C. trusted to keep all data and access to that data under their sole control.
D. given privileges equal to everyone else in the department.
Correct Answer: A
QUESTION 8
Which of the following is a client-server tool utilized to evade firewall inspection?
A. tcp-over-dns
B. kismet
C. nikto
D. hping
Correct Answer: A
QUESTION 9
What is the most common method to exploit the “Bash Bug” or “ShellShock” vulnerability?
A. Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a
vulnerable Web server B. Manipulate format strings in text fields
C. SSH
D. SYN Flood
Correct Answer: A
Shellshock, also known as Bashdoor, is a family of security bugs in the widely used Unix Bash shell. One specific
exploitation vector of the Shellshock bug is CGI-based web servers.
Note: When a web server uses the Common Gateway Interface (CGI) to handle a document request, it passes various
details of the request to a handler program in the environment variable list. For example, the variable
HTTP_USER_AGENT has a value that, in normal usage, identifies the program sending the request. If the request
handler is a Bash script, or if it executes one for example using the system call, Bash will receive the environment
variables passed by the server and will process them. This provides a means for an attacker to trigger the Shellshock
vulnerability with a specially crafted server request.
References: https://en.wikipedia.org/wiki/Shellshock_(software_bug)#Specific_exploitation_vectors
QUESTION 10
Which of the following is a wireless network detector that is commonly found on Linux?
A. Kismet
B. Abel
C. Netstumbler
D. Nessus
Correct Answer: A
QUESTION 11
Which of the following is an example of IP spoofing?
A. SQL injections
B. Man-in-the-middle
C. Cross-site scripting
D. ARP poisoning
Correct Answer: B
QUESTION 12
Which of the following network attacks relies on sending an abnormally large packet size that exceeds TCP/IP specifications?
A. Ping of death
B. SYN flooding
C. TCP hijacking
D. Smurf attack
Correct Answer: A
QUESTION 13
What is the minimum number of network connections in a multihomed firewall?
A. 3
B. 2
C. 5
D. 4
Correct Answer: B
Pass4itsure ECCouncil 312-50V10 dumps discount code 2021
The last sentence:
Latest update Pass4itsure ECCouncil 312-50V10 exam dumps: https://www.pass4itsure.com/312-50v10.html
Free ECCouncil 312-50V10 pdf dumps: https://drive.google.com/file/d/1C9FEe7ay0yaqGiJ_RQ6kZoosHJ2krUgd/view?usp=sharing
The latest ECCouncil 312-50V10 exam questions can help you pass the exam! Trust Pass4itsure to help you pass the exam 100%!