312-50v10 Dumps

312-50v10 Free Practice Test

EC-Council 312-50v10: Certified Ethical Hacker v10

QUESTION 21

- (Exam Topic 6)
Which of the following BEST describes the mechanism of a Boot Sector Virus?

Correct Answer: A

QUESTION 22

- (Exam Topic 1)
Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?

Correct Answer: A

QUESTION 23

- (Exam Topic 6)
While you were gathering information as part of security assessments for one of your clients, you were able to gather data that show your client is involved with fraudulent activities. What should you do?

Correct Answer: A

QUESTION 24

- (Exam Topic 3)
Which NMAP feature can a tester implement or adjust while scanning for open ports to avoid detection by the network’s IDS?

Correct Answer: A

QUESTION 25

- (Exam Topic 4)
It is an entity or event with the potential to adversely impact a system through unauthorized access, destruction, disclosure, denial of service or modification of data.
Which of the following terms best matches the definition?

Correct Answer: A
A threat is at any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Also, the potential for a threat-source to successfully exploit a particular information system vulnerability.
References: https://en.wikipedia.org/wiki/Threat_(computer)