312-50 Certified Ethical Hacker


  • Passing Score: 800
  • Time Limit: 120 min
  • File Version: 3.0
  • Q&A: 614
  • Updated December 2022
Categories: ,
Recommend this page


Start your future with a Data Science Certificate.

Exam Demo

312-50 Certified Ethical Hacker

Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?
A. Fast processor to help with network traffic analysis
B. They must be dual-homed
C. Similar RAM requirements
D. Fast network interface cards

Correct Answer: B

Dual-homed or dual-homing can refer to either an Ethernet device that has more than one network interface, for redundancy purposes, or in firewall
technology, dual-homed is one of the firewall architectures, such as an IDS/IPS system, for implementing preventive security.

Which of the following is an application that requires a host application for replication?
A. Micro
B. Worm
C. Trojan
D. Virus

Correct Answer: D

Computer viruses infect a variety of different subsystems on their hosts. A computer virus is a malware that, when executed, replicates by reproducing it
self or infecting other programs by modifying them. Infecting computer programs can include as well, data files, or the boot sector of the hard drive.
When this replication succeeds, the affected areas are then said to be “infected”.

A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst
will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network.

What tool should the analyst use to perform a Blackjacking attack?
A. Paros Proxy
B. BBProxy
C. BBCrack
D. Blooover

Correct Answer: B

Blackberry users warned of hacking tool threat.
Users have been warned that the security of Blackberry wireless e-mail devices is at risk due to the availability this week of a new hacking tool. Secure
Computing Corporation said businesses that have installed Blackberry servers behind their gateway security devices could be vulnerable to a hacking
attack from a tool call BBProxy.

Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?
A. Restore a random file.
B. Perform a full restore.
C. Read the first 512 bytes of the tape.
D. Read the last 512 bytes of the tape.

Correct Answer: B

A full restore is required.

Which of the following describes the characteristics of a Boot Sector Virus?
A. Moves the MBR to another location on the RAM and copies itself to the original location of the MBR
B. Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR
C. Modifies directory table entries so that directory entries point to the virus code instead of the actual program
D. Overwrites the original MBR and only executes the new virus code

Correct Answer: B

A boot sector virus is a computer virus that infects a storage device’s master boot record (MBR). The virus moves the boot sector to another location on
the hard drive.

Jump start your career with best machine learning introduction course

0/5 (0 Reviews)