312-50v10 | how many questions of 312-50v10 exam?


P.S. Download 312-50v10 preparation labs are available on Google Drive, GET MORE: https://drive.google.com/open?id=1zsw3xzCsgbQD0e_ZoE_G5GuVGlIbaphk


New EC-Council 312-50v10 Exam Dumps Collection (Question 5 - Question 14)

Q1. Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access?

A. Bootrom Exploit

B. iBoot Exploit

C. Sandbox Exploit

D. Userland Exploit

Answer: D

Q2. How does the Address Resolution Protocol (ARP) work?

A. It sends a request packet to all the network elements, asking for the domain name from a specific IP.

B. It sends a request packet to all the network elements, asking for the MAC address from a specific IP.

C. It sends a reply packet to all the network elements, asking for the MAC address from a specific IP.

D. It sends a reply packet for a specific IP, asking for the MAC address.

Answer: B

Q3. Which of the following is considered as one of the most reliable forms of TCP scanning?

A. TCP Connect/Full Open Scan

B. Half-open Scan

C. NULL Scan

D. Xmas Scan

Answer: A

Q4. If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which tool could the tester use to get a response from a host using TCP?

A. Traceroute

B. Hping

C. TCP ping

D. Broadcast ping

Answer: B

Q5. During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a Demilitarized Zone (DMZ) and a second DNS server on the internal network.

What is this type of DNS configuration commonly called?

A. DynDNS

B. DNS Scheme

C. DNSSEC

D. Split DNS

Answer: D

Q6. Sophia travels a lot and worries that her laptop containing confidential documents might be stolen. What is the best protection that will work for her?

A. Disk encryption

B. BIOS password

C. Hidden folders

D. Password protected files

Answer: A

Q7. The establishment of a TCP connection involves a negotiation called three-way handshake. What type of message does the client send to the server in order to begin this negotiation?

A. ACK

B. SYN

C. RST

D. SYN-ACK

Answer: B

Q8. A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0/24. Which of the following has occurred?

A. The computer is not using a private IP address.

B. The gateway is not routing to a public IP address.

C. The gateway and the computer are not on the same network.

D. The computer is using an invalid IP address.

Answer: B

Q9. Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a signature-based IDS?

A. Produces less false positives

B. Can identify unknown attacks

C. Requires vendor updates for a new threat

D. Cannot deal with encrypted network traffic

Answer: B

Q10. Which of the following provides a security professional with most information about the systemu2021s security posture?

A. Wardriving, warchalking, social engineering

B. Social engineering, company site browsing, tailgating

C. Phishing, spamming, sending trojans

D. Port scanning, banner grabbing, service identification

Answer: D

P.S. Easily pass 312-50v10 Exam with Dumpscollection Download Dumps & pdf vce, Try Free: http://www.dumpscollection.net/dumps/312-50v10/ ( New Questions)