312-50v10 | A Review Of Certified 312-50v10 practice test


P.S. 100% Correct 312-50v10 testing bible are available on Google Drive, GET MORE: https://drive.google.com/open?id=1Eru4mEcUV0ULWTU_25JjeXA4U_MAK122


New EC-Council 312-50v10 Exam Dumps Collection (Question 6 - Question 15)

Question No: 6

Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?

A. Omnidirectional antenna

B. Dipole antenna

C. Yagi antenna

D. Parabolic grid antenna

Answer: C

Question No: 7

Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students.

He identified this when the IDS alerted for malware activities in the network. What should Bob do to avoid this problem?

A. Disable unused ports in the switches

B. Separate students in a different VLAN

C. Use the 802.1x protocol

D. Ask students to use the wireless network

Answer: C

Question No: 8

What does the option * indicate?

A. s

B. t

C. n

D. a

Answer: C

Question No: 9

Internet Protocol Security IPSec is actually a suite of protocols. Each protocol within the suite provides different functionality. Collective IPSec does everything except.

A. Work at the Data Link Layer

B. Protect the payload and the headers

C. Encrypt

D. Authenticate

Answer: A

Question No: 10

Which of the following act requires employeru2021s standard national numbers to identify them on standard transactions?

A. SOX

B. HIPAA

C. DMCA

D. PCI-DSS

Answer: B

Question No: 11

The collection of potentially actionable, overt, and publicly available information is known as

A. Open-source intelligence

B. Human intelligence

C. Social intelligence

D. Real intelligence

Answer: A

Question No: 12

Which is the first step followed by Vulnerability Scanners for scanning a network?

A. TCP/UDP Port scanning

B. Firewall detection

C. OS Detection

D. Checking if the remote host is alive

Answer: D

Question No: 13

If you want only to scan fewer ports than the default scan using Nmap tool, which option would you use?

A. -sP

B. -P

C. -r

D. -F

Answer: B

Question No: 14

Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?

A. 123

B. 161

C. 69

D. 113

Answer: A

Question No: 15

An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections.

When users accessed any page, the applet ran and exploited many machines. Which one of the following tools the hacker probably used to inject HTML code?

A. Wireshark

B. Ettercap

C. Aircrack-ng

D. Tcpdump

Answer: B

Recommend!! Get the 100% Correct 312-50v10 dumps in VCE and PDF From Examcollectionplus, Welcome to download: https://www.examcollectionplus.net/vce-312-50v10/ (New Q&As Version)