EC-Council 312-50V10 Exam
Certified Ethical Hacker Exam (Updated to CEH v12) (Page 12 )

Updated On: 19-Jan-2026

You are tasked to configure the DHCP server to lease the last 100 usable IP addresses in subnet to. 1.4.0/23. Which of the following IP addresses could be teased as a result of the new configuration?

  1. 210.1.55.200
  2. 10.1.4.254
  3. 10.1.5.200
  4. 10.1.4.156

Answer(s): C



Which of these is capable of searching for and locating rogue access points?

  1. HIDS
  2. WISS
  3. WIPS
  4. NIDS

Answer(s): C



An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?

  1. Reverse Social Engineering
  2. Tailgating
  3. Piggybacking
  4. Announced

Answer(s): B



When conducting a penetration test, it is crucial to use all means to get all available information about the target network. One of the ways to do that is by sniffing the network. Which of the following cannot be performed by the passive network sniffing?

  1. Identifying operating systems, services, protocols and devices
  2. Modifying and replaying captured network traffic
  3. Collecting unencrypted information about usernames and passwords
  4. Capturing a network traffic for further analysis

Answer(s): B



You want to analyze packets on your wireless network. Which program would you use?

  1. Airsnort with Airpcap
  2. Wireshark with Airpcap
  3. Wireshark with Winpcap
  4. Ethereal with Winpcap

Answer(s): A



Viewing page 12 of 102
Viewing questions 56 - 60 out of 736 questions



Post your Comments and Discuss EC-Council 312-50V10 exam prep with other Community members:

Join the 312-50V10 Discussion