Eccouncil 312-50 Certified Ethical Hacker v10 Exam Practice Test

Page: 1 / 14
Total 742 questions

Question 1

What kind of detection techniques is being used in antivirus softwares that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it's made on the premiers environment-

Answer : A

Question 2

Tremp is an IT Security Manager, and he is planning to deploy an IDS in his small company. He is looking for an IDS with the following characteristics: - Verifies success or failure of an attack - Monitors system activities Detects attacks that a network-based IDS fails to detect - Near real-time detection and response - Does not require additional hardware - Lower entry cost Which type of IDS is best suited for Tremp's requirements?

Answer : C

Question 3

What is the purpose of DNS AAAA record?

Answer : D

Question 4

OpenSSL on Linux servers includes a command line tool for testing TLS. What is the name of the tool and the correct syntax to connect to a web server?

Answer : C

Question 5

You are performing a penetration test for a client and have gained shell access to a Windows machine on the internal network. You intend to retrieve all DNS records for the internal domain, if the DNS server is at and the domain name is abccorp.local, what command would you type at the nslookup prompt to attempt a zone transfer?

Answer : B

Question 6

How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?

Answer : B

Question 7

What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?

Answer : C

Page:    1 / 14   
Total 742 questions