Exam Code: 312-50
Exam Questions: 885
Certified Ethical Hacker V13
Updated: 20 Feb, 2026
Viewing Page : 1 - 89
Practicing : 1 - 5 of 885 Questions
Question 1

Which of the following is a component of a risk assessment? 

Options :
Answer: A

Question 2

What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common? 

Options :
Answer: C

Question 3

Which of the following statements is TRUE? 

Options :
Answer: B

Question 4

Shiela is an information security analyst working at HiTech Security Solutions. She is performing service version discovery using Nmap to obtain information about the running services and their versions on a target system. Which of the following Nmap options must she use to perform service version discovery on the target host?

Options :
Answer: C

Question 5

Let's imagine three companies (A, B and C), all competing in a challenging global environment. Company A and B are working together in developing a product that will generate a major competitive advantage for them. Company A has a secure DNS server while company B has a DNS server vulnerable to spoofing. With a spoofing attack on the DNS server of company B, company C gains access to outgoing e-mails from company B. How do you prevent DNS spoofing? 

Options :
Answer: C

Viewing Page : 1 - 89
Practicing : 1 - 5 of 885 Questions

© Copyrights FreePDFQuestions 2026. All Rights Reserved

We use cookies to ensure that we give you the best experience on our website (FreePDFQuestions). If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the FreePDFQuestions.