Eccouncil 312-50v10 Exam Material | 312-50v10 Dumps PDF | Dumpspass4sure


SAMPLE QUESTIONS:

Question No. 1

Which of the following network attacks relies on sending an abnormally large packet size that exceeds TCP/IP specifications?

A. Ping of death
B. SYN flooding
C. TCP hijacking
D. Smurf attack

ANSWER : A


Question No. 2


Which of the following is a common Service Oriented Architecture (SOA) vulnerability?

A. Cross-site scripting
B. SQL injection
C. VPath injection
D. XML denial of service issues

ANSWER : D


Question No. 3

In which phase of the ethical hacking process can Google hacking be employed? This is a technique that involves manipulating a search string with specific operators to search for vulnerabilities. Example: allintitle: root passwd

A. Maintaining Access
B. Gaining Access
C. Reconnaissance
D. Scanning and Enumeration

ANSWER : C


Question No. 4

During an Xmas scan what indicates a port is closed?

A. No return response
B. RST
C. ACK
D. SYN

ANSWER : B


Question No. 5


_________ is a tool that can hide processes from the process list, can hide files, registry entries, and intercept keystrokes.

A. Trojan
B. RootKit
C. DoS tool
D. Scanner
E. Backdoor

ANSWER : B

FOR MORE INFORMATION

VISIT NOW:

Comments

Popular posts from this blog

Microsoft DA-100 Exam Material | DA-100 Dumps PDF | Dumpspass4sure

Get 2021 CMRP PDF Guide Including 100% Reliable Questions

Solve Your All IT Problems By Using Our RedHat EX200 Exam Dumps