Free Certified Ethical Hacker v10 312-50 Exam Practice Test
312-50 Exam Features
In Just $59 You can Access
- All Official Question Types
- Interactive Web-Based Practice Test Software
- No Installation or 3rd Party Software Required
- Customize your practice sessions (Free Demo)
- 24/7 Customer Support
Total Questions: 572
-
Which of the following is a command line packet analyzer similar to GUI-based Wireshark?
Answer: 1 Next Question -
What does the -oX flag do in an Nmap scan?
Answer: 4 Next Question -
First thing you do every office day is to check your email inbox. One morning, you received an email from your best friend and the subject line is quite strange. What should you do?
Answer: 3 Next Question -
During a penetration test, the tester conducts an ACK scan using NMAP against the external interface of the DMZ firewall. NMAP reports that port 80 is unfiltered. Based on this response, which type of packet inspection is the firewall conducting?
Answer: 3 Next Question -
Which NMAP command combination would let a tester scan every TCP port from a class C network that is blocking ICMP with fingerprinting and service detection?
Answer: 2 Next Question -
An NMAP scan of a server shows port 69 is open. What risk could this pose?
Answer: 1 Next Question -
To determine if a software program properly handles a wide range of invalid input, a form of automated testing can be used to randomly generate invalid input in an attempt to crash the program.What term is commonly used when referring to this type of testing?
Answer: 1 Next Question -
env x=`(){ :;};echo exploit` bash -c 'cat /etc/passwd'What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?
Answer: 1 Next Question -
Supposed you are the Chief Network Engineer of a certain Telco. Your company is planning for a big business expansion and it requires that your network authenticate users connecting using analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network. Which AAA protocol would you implement?
Answer: 4 Next Question -
You have several plain-text firewall logs that you must review to evaluate network traffic. You know that in order to do fast, efficient searches of the logs you must use regular expressions.Which command-line utility are you most likely to use?
Answer: 1 Next Question
Total Questions: 572
