EC-Council 312-50V10 Exam
Certified Ethical Hacker Exam (Updated to CEH v12) (Page 10 )

Updated On: 19-Jan-2026

A hacker has successfully infected an internet-facing server which he will then use to send junk mail, take part in coordinated attacks, or host junk email content. Which sort of trojan infects this server?

  1. Botnet Trojan
  2. Banking Trojans
  3. Turtle Trojans
  4. Ransomware Trojans

Answer(s): A



You have compromised a server and successfully gained a root access. You want to pivot and pass traffic undetected over the network and evade any possible Intrusion Detection System. What is the best approach?

  1. Use Alternate Data Streams to hide the outgoing packets from this server.
  2. Use HTTP so that all traffic can be routed vis a browser, thus evading the internal Intrusion Detection Systems.
  3. Install Cryptcat and encrypt outgoing packets from this server.
  4. Install and use Telnet to encrypt all outgoing traffic from this server.

Answer(s): C



Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?

  1. ACK flag probe scanning
  2. ICMP Echo scanning
  3. SYN/FIN scanning using IP fragments
  4. IPID scanning

Answer(s): C



You are logged in as a local admin on a Windows 7 system and you need to launch the Computer Management Console from command line.

Which command would you use?

  1. c:\compmgmt.msc
  2. c:\services.msc
  3. c:\ncpa.cp
  4. c:\gpedit

Answer(s): A

Explanation:

To start the Computer Management Console from command line just type compmgmt.msc
/computer:computername in your run box or at the command line and it should automatically open the Computer Management console.

References: http://www.waynezim.com/tag/compmgmtmsc/


Reference:

References: http://www.waynezim.com/tag/compmgmtmsc/



A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted.

Which cryptography attack is the student attempting?

  1. Man-in-the-middle attack
  2. Brute-force attack
  3. Dictionary attack
  4. Session hijacking

Answer(s): C



Viewing page 10 of 102
Viewing questions 46 - 50 out of 736 questions



Post your Comments and Discuss EC-Council 312-50V10 exam prep with other Community members:

Join the 312-50V10 Discussion