Certified Ethical Hacker v10 Exam

Here you have the best ECCouncil 312-50v10 practice exam questions

  • You have 322 total questions across 65 pages (5 per page)
  • These questions were last updated on February 19, 2026
  • This site is not affiliated with or endorsed by ECCouncil.
Question 1 of 322

An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?
Answer

Suggested Answer

The suggested answer is B.

The individual performed tailgating. Tailgating is the act of an unauthorized person gaining access to a building or secured area by closely following an authorized person through a secure entrance without the knowledge or consent of the authorized person. It commonly involves exploiting the security procedure of a door being held open for someone following behind. In contrast, piggybacking typically implies that the authorized person is aware and permits the unauthorized person to enter.

Community Votes

No votes yet

Join the discussion to cast yours

Question 2 of 322

Which of the following is the best countermeasure to encrypting ransomwares?
Answer

Suggested Answer

The suggested answer is B.

The best countermeasure to encrypting ransomware is to keep some generation of off-line backup. This allows recovery of data without paying the ransom or relying on decrypting the virus itself. Off-line backups are not accessible by the ransomware, thereby providing a safe repository of your data that can be restored in the event of an attack.

Community Votes

No votes yet

Join the discussion to cast yours

Question 3 of 322

If an attacker uses the command SELECT*FROM user WHERE name = "˜x' AND userid IS NULL; --"˜; which type of SQL injection attack is the attacker performing?
Answer

Suggested Answer

The suggested answer is A.

In this scenario, the attacker is using an End of Line Comment to nullify the rest of the SQL query. This technique is employed by injecting comments after the input to ignore the remaining legitimate query code. By using the ' -- ' sequence, any following text will be treated as a comment and thus not executed, which can be leveraged to manipulate the SQL query for malicious purposes.

Community Votes4 votes
CMost voted
50%
ASuggested
50%
Question 4 of 322

Sophia travels a lot and worries that her laptop containing confidential documents might be stolen. What is the best protection that will work for her?
Answer

Suggested Answer

The suggested answer is A.

Full Disk encryption is the best protection for Sophia's laptop containing confidential documents. This method encrypts the entire hard drive, rendering the data inaccessible to unauthorized users even if they physically possess the laptop. Unlike BIOS passwords, hidden folders, or password protected files—which can all be bypassed or cracked with relative ease—full disk encryption ensures that the data remains secure and unreadable without the proper decryption key.

Community Votes

No votes yet

Join the discussion to cast yours

Question 5 of 322

An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", that the user is directed to a phishing site.
Which file does the attacker need to modify?
Answer

Suggested Answer

The suggested answer is D.

The file that the attacker needs to modify is the Hosts file. By editing the Hosts file, an attacker can specify custom mappings between domain names and IP addresses. This means they can redirect traffic intended for a legitimate site like 'www.MyPersonalBank.com' to a malicious phishing site by setting the desired IP address in the Hosts file. Typically, the Hosts file is located in the system directory (e.g., C:\Windows\System32\drivers\etc\hosts on Windows) and overrides DNS resolution, ensuring the specified mappings take precedence.

Community Votes

No votes yet

Join the discussion to cast yours

About the ECCouncil 312-50v10 Certification Exam

About the Exam

The ECCouncil 312-50v10 (Certified Ethical Hacker v10 Exam) validates your knowledge and skills. Passing demonstrates proficiency and can boost your career prospects in the field.

How to Prepare

Work through all 322 practice questions across 65 pages. Focus on understanding the reasoning behind each answer rather than memorizing responses to be ready for any variation on the real exam.

Why Practice Exams?

Practice exams help you familiarize yourself with the question format, manage your time, and reduce anxiety on the test day. Our 312-50v10 questions are regularly updated to reflect the latest exam objectives.