Vcehome > EC-COUNCIL > Certified Ethical Hacker > 312-50V7 > 312-50V7 Online Practice Questions and Answers

312-50V7 Online Practice Questions and Answers

Questions 4

What is the problem with this ASP script (login.asp)?

A. The ASP script is vulnerable to Cross Site Scripting attack

B. The ASP script is vulnerable to Session Splice attack

C. The ASP script is vulnerable to XSS attack

D. The ASP script is vulnerable to SQL Injection attack

Browse 514 Q&As
Questions 5

While performing a ping sweep of a local subnet you receive an ICMP reply of Code 3/Type 13 for all the pings you have sent out. What is the most likely cause of this?

A. The firewall is dropping the packets

B. An in-line IDS is dropping the packets

C. A router is blocking ICMP

D. The host does not respond to ICMP packets

Browse 514 Q&As
Questions 6

Take a look at the following attack on a Web Server using obstructed URL:

How would you protect from these attacks?

A. Configure the Web Server to deny requests involving "hex encoded" characters

B. Create rules in IDS to alert on strange Unicode requests

C. Use SSL authentication on Web Servers

D. Enable Active Scripts Detection at the firewall and routers

Browse 514 Q&As
Questions 7

Bill is a security analyst for his company. All the switches used in the company's office are Cisco switches. Bill wants to make sure all switches are safe from ARP poisoning. How can Bill accomplish this?

A. Bill can use the command: ip dhcp snooping.

B. Bill can use the command: no ip snoop.

C. Bill could use the command: ip arp no flood.

D. He could use the command: ip arp no snoop.

Browse 514 Q&As
Questions 8

You are the security administrator for a large network. You want to prevent attackers from running any sort of traceroute into your DMZ and discovering the internal structure of publicly accessible areas of the network. How can you achieve this?

A. There is no way to completely block tracerouting into this area

B. Block UDP at the firewall

C. Block TCP at the firewall

D. Block ICMP at the firewall

Browse 514 Q&As
Questions 9

Which type of scan measures a person's external features through a digital video camera?

A. Iris scan

B. Retinal scan

C. Facial recognition scan

D. Signature kinetics scan

Browse 514 Q&As
Questions 10

In the software security development life cyle process, threat modeling occurs in which phase?

A. Design

B. Requirements

C. Verification

D. Implementation

Browse 514 Q&As
Questions 11

Which of the following items of a computer system will an anti-virus program scan for viruses?

A. Boot Sector

B. Deleted Files

C. Windows Process List

D. Password Protected Files

Browse 514 Q&As
Questions 12

A. PIN Number and Birth Date

B. Username and Password

C. Digital Certificate and Hardware Token

D. Fingerprint and Smartcard ID

Browse 514 Q&As
Questions 13

Which of the following techniques will identify if computer files have been changed?

A. Network sniffing

B. Permission sets

C. Integrity checking hashes

D. Firewall alerts

Browse 514 Q&As
Exam Code: 312-50V7
Exam Name: Ethical Hacking and Countermeasures (CEHv7)
Last Update: Apr 27, 2024
Questions: 514 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99