top of page
  • Writer's pictureKaty Morgan

Introduction to EC-Council Certified Ethical Hacker (CEH) Exam

The EC-Council 312-50 Exam is challenging and thorough preparation is essential for success. This exam study guide is designed to help you prepare for the CEH certification exam. It contains a detailed list of the topics covered on the Professional exam, as well as a detailed list of preparation resources. These study guides for the EC-Council Certified Ethical Hacker will help guide you through the study process for your certification.

312-50 pdf, 312-50 questions, 312-50 exam guide, 312-50 practice test, 312-50 books, 312-50 Syllabus, 312-50

312-50 EC-Council Certified Ethical Hacker Exam Summary


Exam Name: EC-Council Certified Ethical Hacker

Exam Code: 312-50

Exam Price: $950 (USD)

Duration: 240 mins

Number of Questions: 125

Passing Score: 70%

Books / Training: Courseware

Schedule Exam: Pearson VUE

Sample Questions: EC-Council CEH Sample Questions


Exam Syllabus: 312-50 EC-Council Certified Ethical Hacker (CEH)


1. Background (21.79%)

- Network and Communication Technologies

- Information Security Threats and Attack Vector

- Information Security Technologies

2. Analysis / Assessment (12.73%)

- Information Security Assessment and Analysis

- Information Security Assessment Process


3. Security (23.73%)

- Information Security Controls

- Information Security Attack Detection

- Information Security Attack Prevention


4. Tools / Systems / Programs (28.91%)

- Information Security Systems

- Information Security Programs

- Information Security Tools


5. Procedures / Methodology (8.77%)

- Information Security Procedures

- Information Security Assessment Methodologies


6. Regulation / Policy (1.90%)

- Information Security Policies/Laws/Acts


7. Ethics (2.17%)

- Ethics of Information Security


EC-Council 312-50 Certification Sample Questions and Answers


To make you familiar with the EC-Council Certified Ethical Hacker (312-50) certification exam structure, we have prepared this sample question set. We suggest you to try our Sample Questions for CEH v10 312-50 Certification to test your understanding of the EC-Council 312-50 process with the real EC-Council certification exam environment.


312-50 EC-Council Certified Ethical Hacker Sample Questions:-


01. Which of the following is a mutation technique used for writing buffer overflow exploits in order to avoid IDS and other filtering mechanisms?

a) Assuming that a string function is exploited, send a long string as the input

b) Randomly replace the NOPs with functionally equivalent segments of the code (e.g.: x++; x-; ? NOP NOP)

c) Pad the beginning of the intended buffer overflow with a long run of NOP instructions (a NOP slide or sled) so the CPU will do nothing until it gets to the “main event”

d) Make a buffer to overflow on the lower part of heap, overwriting other dynamic variables, which can have unexpected and unwanted effects


02. Which cryptographic attack refers to the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by coercion or torture?

a) Ciphertext-only Attack

b) Chosen-ciphertext Attack

c) Adaptive Chosen-plaintext Attack

d) Rubber Hose Attack


03. Network Time Protocol (NTP) is designed to synchronize clocks of networked computers. Which of the following ports does NTP use as its primary means of communication?

a) UDP port 123

b) UDP port 113

c) UDP port 161

d) UDP port 320


04. Which one of the following scanning techniques do attackers use to bypass firewall rules, logging mechanism, and also hide themselves as usual network traffic?

a) Stealth scanning technique

b) TCP connect scanning technique

c) Xmas scanning technique

d) Maintaining Access

e) FIN scanning technique


05. Which of the following scan only works if an operating system’s TCP/IP implementation is based on RFC 793?

a) NULL scan

b) IDLE scan

c) TCP connect scan

d) Maintaining Access

e) FTP bounce scan


06. A wireless antenna is an electrical device which converts electric currents into radio waves, and vice versa. Which antenna is used in wireless base stations and provides a 360 degree horizontal radiation pattern?

a) Omnidirectional antenna

b) Parabolic grid antenna

c) Yagi antenna

d) Dipole antenna


07. Consider the attack scenario given below:

Step 1: User browses a web page

Step 2: Web server replies with requested page and sets a cookie on the user’s browser

Step 3: Attacker steals cookie (Sniffing, XSS, phishing attack)

Step 4: Attacker orders for product using modified cookie

Step 5: Product is delivered to attacker’s address

Identify the web application attack.

a) Session fixation attack

b) Unvalidated redirects attack

c) Cookie poisoning attack

d) Denial-of-Service (DoS) attack


08. Which following OSI layer is responsible for encoding and decoding data packets into bits?

a) Application layer

b) Session layer

c) Data link layer

d) Network layer


09. Which of the following Wi-Fi chalking method refers to drawing symbols in public places to advertise open Wi-Fi networks?

a) WarWalking

b) WarFlying

c) WarChalking

d) WarDriving


10. CAM table in switch stores information such as MAC addresses available on physical ports with their associated VLAN parameters. What happens when the CAM table is full?

a) Additional ARP request traffic will not be forwarded to any port on the switch

b) The switch will stop functioning and get disconnected from network

c) Additional ARP request traffic will flood every port on the switch

d) It does not affect the switch functioning


Answers:-


Answer 1:- b

Answer 2:- d

Answer 3:- a

Answer 4:- a

Answer 5:- a

Answer 6:- a

Answer 7:- c

Answer 8:- c

Answer 9:- c

Answer 10:- c

bottom of page