The EC-Council 312-50 Exam is challenging and thorough preparation is essential for success. This exam study guide is designed to help you prepare for the CEH certification exam. It contains a detailed list of the topics covered on the Professional exam, as well as a detailed list of preparation resources. These study guide for the EC-Council Certified Ethical Hacker will help guide you through the study process for your certification.
312-50 EC-Council Certified Ethical Hacker Exam Summary
Exam Name: EC-Council Certified Ethical Hacker
Exam Code: 312-50
Exam Price: $350 (USD)
Duration: 240 mins
Number of Questions: 100
Passing Score: 70%
Reference Books: Courseware OR ECC Exam Center
Schedule Exam: Pearson VUE
Sample Questions: EC-Council CND Sample Questions
Recommended Practice: EC-Council 312-38 Certification Practice Exam
Exam Syllabus: 312-50 EC-Council Certified Ethical Hacker (CEH)
Module 01
Computer Network and Defense Fundamentals.
Module 02
Network Security Threats, Vulnerabilities, and Attacks.
Module 03
Network Security Controls, Protocols, and Devices.
Module 04
Network Security Policy Design and Implementation.
Module 05
Physical Security.
Module 06
Host Security.
Module 07
Secure Firewall Configuration and Management.
Module 08
Secure IDS Configuration and Management.
Module 09
Secure VPN Configuration and Management.
Module 10
Wireless Network Defense.
Module 11
Network Traffic Monitoring and Analysis.
Module 12
Network Risk and Vulnerability Management.
Module 13
Data Backup and Recovery.
Module 14
Network Incident Response and Management.
EC-Council 312-50 Certification Sample Questions and Answers
To make you familiar with EC-Council Certified Ethical Hacker (312-50) certification exam structure, we have prepared this sample question set. We suggest you to try our Sample Questions for CEH v10 312-50 Certification to test your understanding of EC-Council 312-50process with real EC-Council certification exam environment.
312-50 EC-Council Certified Ethical Hacker Sample Questions:-
Question: 01. CSMA/CD is specified in which of the following IEEE standards?
a) 802.3
b) 802.2
c) 802.1
d) 802.15
Question: 02. The IP addresses reserved for experimental purposes belong to which of the following classes?
a) Class E
b) Class C
c) Class A
d) Class D
Question: 03. Which of the following is a symmetric 64-bit block cipher that can support key lengths up to 448 bits?
a) HAVAL
b) BLOWFISH
c) IDEA
d) XOR
Question: 04. How many layers are present in the OSI layer model?
a) 5
b) 4
c) 7
d) 9
Question: 05. Which of the following cables is made of glass or plastic and transmits signals in the form of light?
a) Coaxial cable
b) Twisted pair cable
c) Plenum cable
d) Fiber optic cable
Question: 06. Which of the following is one of the most commonly used implementations of RAID?
a) RAID 2
b) RAID 3
c) RAID 1
d) RAID 5
Question: 07. Attacks are classified into which of the following?
a) Active attack
b) Session hijacking
c) Passive attack
d) Replay attack
Question: 08. In which of the following conditions does the system enter ROM monitor mode?
a) The router does not have a configuration file.
b) There is a need to set operating parameters.
c) The user interrupts the boot sequence.
d) The router does not find a valid operating system image.
Question: 09. Which of the following is a mandatory password-based and key-exchange authentication protocol?
a) PPP
b) CHAP
c) VRRP
d) DH-CHAP
Question: 10. What is the bit size of the Next Header field in the IPv6 header format?
a) 2 bits
b) 4 bits
c) 8 bits
d) 20 bits
Answers:-
Answer: 01 :- a
Answer: 02 :- a
Answer: 03 :- b
Answer: 04 :- c
Answer: 05 :- d
Answer: 06 :- d
Answer: 07 :- a, c
Answer: 08 :- c, d
Answer: 09 :- d
Answer: 10 :- c
Comentarios