Pass4itsure > EC-COUNCIL > Certified Ethical Hacker > 312-50V7 > 312-50V7 Online Practice Questions and Answers

312-50V7 Online Practice Questions and Answers

Questions 4

In Trojan terminology, what is required to create the executable file chess.exe as shown below?

A. Mixer

B. Converter

C. Wrapper

D. Zipper

Buy Now
Questions 5

This TCP flag instructs the sending system to transmit all buffered data immediately.

A. SYN

B. RST

C. PSH

D. URG

E. FIN

Buy Now
Questions 6

Least privilege is a security concept that requires that a user is

A. limited to those functions required to do the job.

B. given root or administrative privileges.

C. trusted to keep all data and access to that data under their sole control.

D. given privileges equal to everyone else in the department.

Buy Now
Questions 7

Which of the following is a common Service Oriented Architecture (SOA) vulnerability?

A. Cross-site scripting

B. SQL injection

C. VPath injection

D. XML denial of service issues

Buy Now
Questions 8

A company firewall engineer has configured a new DMZ to allow public systems to be located away from the internal network. The engineer has three security

zones set:

Untrust (Internet) (Remote network = 217.77.88.0/24)

DMZ (DMZ) (11.12.13.0/24)

Trust (Intranet) (192.168.0.0/24)

The engineer wants to configure remote desktop access from a fixed IP on the remote network to a remote desktop server in the DMZ. Which rule would best fit

this requirement?

A. Permit 217.77.88.0/24 11.12.13.0/24 RDP 3389

B. Permit 217.77.88.12 11.12.13.50 RDP 3389

C. Permit 217.77.88.12 11.12.13.0/24 RDP 3389

D. Permit 217.77.88.0/24 11.12.13.50 RDP 3389

Buy Now
Questions 9

Which of the following problems can be solved by using Wireshark?

A. Tracking version changes of source code

B. Checking creation dates on all webpages on a server

C. Resetting the administrator password on multiple systems

D. Troubleshooting communication resets between two systems

Buy Now
Questions 10

Bluetooth uses which digital modulation technique to exchange information between paired devices?

A. PSK (phase-shift keying)

B. FSK (frequency-shift keying)

C. ASK (amplitude-shift keying)

D. QAM (quadrature amplitude modulation)

Buy Now
Questions 11

To send a PGP encrypted message, which piece of information from the recipient must the sender have before encrypting the message?

A. Recipient's private key

B. Recipient's public key

C. Master encryption key

D. Sender's public key

Buy Now
Questions 12

Which of the following is an advantage of utilizing security testing methodologies to conduct a security audit?

A. They provide a repeatable framework.

B. Anyone can run the command line scripts.

C. They are available at low cost.

D. They are subject to government regulation.

Buy Now
Questions 13

A person approaches a network administrator and wants advice on how to send encrypted email from home. The end user does not want to have to pay for any license fees or manage server services. Which of the following is the most secure encryption protocol that the network administrator should recommend?

A. IP Security (IPSEC)

B. Multipurpose Internet Mail Extensions (MIME)

C. Pretty Good Privacy (PGP)

D. Hyper Text Transfer Protocol with Secure Socket Layer (HTTPS)

Buy Now
Exam Code: 312-50V7
Exam Name: Ethical Hacking and Countermeasures (CEHv7)
Last Update: Nov 25, 2024
Questions: 514
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99