EC-Council CEH (312-50) Certification Sample Questions

CEH Dumps, 312-50 Dumps, 312-50 PDF, CEH VCE, EC-Council 312-50 VCE, EC-Council CEH v10 PDFThe purpose of this Sample Question Set is to provide you with information about the EC-Council Certified Ethical Hacker exam. These sample questions will make you very familiar with both the type and the difficulty level of the questions on the 312-50 certification test. To get familiar with real exam environment, we suggest you try our Sample EC-Council CEH Certification Practice Exam. This sample practice exam gives you the feeling of reality and is a clue to the questions asked in the actual EC-Council Certified Ethical Hacker (CEH) certification exam.

These sample questions are simple and basic questions that represent likeness to the real EC-Council 312-50 exam questions. To assess your readiness and performance with real time scenario based questions, we suggest you prepare with our Premium EC-Council CEH Certification Practice Exam. When you solve real time scenario based questions practically, you come across many difficulties that give you an opportunity to improve.

EC-Council 312-50 Sample Questions:

01. Which of the following opens the Computer Management MMC in a Windows command line?
a) compmgmt.mmc
b) compmgmt.msc
c) compmgmt.exe
d) computermgmt.exe
 
02. If a rootkit is discovered on the system, which of the following is the best alternative for recovery?
a) Replacing all data files from a good backup
b) Installing Tripwire
c) Reloading the entire system from known-good media
d) Deleting all data files and reboot
 
03. What type of database uses multiple tables linked together in complex relationships?
a) Hierarchical
b) Relational
c) Distributed
d) Flat
 
04. A pen test member is running the Airsnarf tool from a Linux laptop. What is she attempting?
a) MAC flooding against an AP on the network
b) Denial-of-service attacks against APs on the network
c) Cracking network encryption codes from the WEP AP
d) Stealing usernames and passwords from an AP
 
05. In what layer of the OSI reference model is session hijacking carried out?
a) Data link layer
b) Transport layer
c) Network layer
d) Physical layer
 
06. Google Docs and Salesforce CRM are two examples of which cloud computing model?
a) IaaS
b) PaaS
c) SaaS
d) Public
 
07. Which type of attack sends fake entries to a DNS server to corrupt the information stored there?
a) DNS DoS
b) DNS cache poisoning
c) DNS pharming
d) DNS zone transfer
 
08. In which layer of the OSI model could ARP poisoning occur?
a) Network
b) Data link
c) Session
d) Transport
 
09. Veriato Investigator is an example of what?
a) Software keylogger
b) Trojan
c) Hardware keylogger
d) Covert communication tool
 
10. Cookie Cadger is an example of which of the following?
a) Botnet
b) DoS tool
c) Sniffing tool
d) Session hijacking tool

Answers:

Question: 01
Answer: b
Question: 02
Answer: c
Question: 03
Answer: b
Question: 04
Answer: d
Question: 05
Answer: b
Question: 06
Answer: c
Question: 07
Answer: b
Question: 08
Answer: b
Question: 09
Answer: a
Question: 10
Answer: d

Note: For any error in EC-Council Certified Ethical Hacker (CEH) (312-50) certification exam sample questions, please update us by writing an email on feedback@edusum.com.

Rating: 4.9 / 5 (36 votes)