312-50v10 Dumps

312-50v10 Free Practice Test

EC-Council 312-50v10: Certified Ethical Hacker v10

QUESTION 16

- (Exam Topic 2)
What are the three types of authentication?

Correct Answer: B

QUESTION 17

- (Exam Topic 5)
If executives are found liable for not properly protecting their company's assets and information systems, what type of law would apply in this situation?

Correct Answer: A

QUESTION 18

- (Exam Topic 6)
In IPv6 what is the major difference concerning application layer vulnerabilities compared to IPv4?

Correct Answer: B

QUESTION 19

- (Exam Topic 2)
A pentester is using Metasploit to exploit an FTP server and pivot to a LAN. How will the pentester pivot using Metasploit?

Correct Answer: D

QUESTION 20

- (Exam Topic 7)
Gavin owns a white-hat firm and is performing a website security audit for one of his clients. He begins by running a scan which looks for common misconfigurations and outdated software versions. Which of the following tools is he most likely using?

Correct Answer: B