BlackFriday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Free Eccouncil 312-50 Exam Dumps

Here you can find all the free questions related with Eccouncil Certified Ethical Hacker v12 (312-50) exam. You can also find on this page links to recently updated premium files with which you can practice for actual Eccouncil Certified Ethical Hacker v12 Exam. These premium versions are provided as 312-50 exam practice tests, both as desktop software and browser based application, you can use whatever suits your style. Feel free to try the Certified Ethical Hacker v12 Exam premium files for free, Good luck with your Eccouncil Certified Ethical Hacker v12 Exam.
Question No: 1

MultipleChoice

Darius is analysing logs from IDS. He want to understand what have triggered one alert and verify if it's true positive or false positive. Looking at the logs he copy and paste basic details like below:

source IP: 192.168.21.100

source port: 80

destination IP: 192.168.10.23

destination port: 63221

What is the most proper answer.

Options
Question No: 2

MultipleChoice

Analyst is investigating proxy logs and found out that one of the internal user visited website storing suspicious Java scripts. After opening one of them, he noticed that it is very hard to understand the code and that all codes differ from the typical Java script. What is the name of this technique to hide the code and extend analysis time?

Options
Question No: 3

MultipleChoice

What does the -oX flag do in an Nmap scan?

Options
Question No: 4

MultipleChoice

DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which security feature on switches leverages the DHCP snooping database to help prevent man-in-the-middle attacks?

Options
Question No: 5

MultipleChoice

A company's policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department. Using Wire shark to examine the captured traffic, which command can be used as a display filter to find unencrypted file transfers?

Options
Question No: 6

MultipleChoice

During the process of encryption and decryption, what keys are shared?

During the process of encryption and decryption, what keys are shared?

Options
Question No: 7

MultipleChoice

Your business has decided to add credit card numbers to the data it backs up to tape. Which of the

following represents the best practice your business should observe?

Options
Question No: 8

MultipleChoice

Developers at your company are creating a web application which will be available for use by anyone on the Internet, The developers have taken the approach of implementing a Three-Tier Architecture for the web application. The developers are now asking you which network should the Presentation Tier (front- end web server) be placed in?

Options
Question No: 9

MultipleChoice

An attacker tries to do banner grabbing on a remote web server and executes the following command.

Nmap done: 1 IP address (1 host up) scanned in 6.42 seconds

What did the hacker accomplish?

Options
Question No: 10

MultipleChoice

Company XYZ has asked you to assess the security of their perimeter email gateway. From your office in New York, you craft a specially formatted email message and send it across the Internet to an employee of Company XYZ. The employee of Company XYZ is aware of your test.

Your email message looks like this:

From: jim_miller@companyxyz.com

To: michelle_saunders@companyxyz.com

Subject: Test message

Date: 4/3/2017 14:37

The employee of Company XYZ receives your email message. This proves that Company XYZ's email gateway doesn't prevent what?

Options

Save Cancel