Free 312-50 Mock Exam – Practice Online Confidently

Increase your chances of passing the Eccouncil 312-50 exam questions on your first try. Practice with our free online 312-50 exam mock test designed to help you prepare effectively and confidently.

Exam Code: 312-50
Exam Questions: 885
Certified Ethical Hacker V13
Updated: 18 Feb, 2026
Question 1

Let's imagine three companies (A, B and C), all competing in a challenging global environment. Company A and B are working together in developing a product that will generate a major competitive advantage for them. Company A has a secure DNS server while company B has a DNS server vulnerable to spoofing. With a spoofing attack on the DNS server of company B, company C gains access to outgoing e-mails from company B. How do you prevent DNS spoofing? 

Options :
Answer: C

Question 2

The security administrator of ABC needs to permit Internet traffic in the host 10.0.0.2 and UDP traffic in the
host
10.0.0.3. He also needs to permit all FTP traffic to the rest of the network and deny all other traffic. After he
applied his ACL configuration in the router, nobody can access the ftp, and the permitted hosts cannot access
the Internet. According to the next configuration, what is happening in the network?
access-list 102 deny tcp any any
access-list 104 permit udp host 10.0.0.3 any
access-list 110 permit tcp host 10.0.0.2 eq www any
access-list 108 permit tcp any eq ftp any

Options :
Answer: B

Question 3

Which results will be returned with the following Google search query? site:target.com – site:Marketing.target.com accounting

Options :
Answer: D

Question 4

Which of the following commands checks for valid users on an SMTP server? 

Options :
Answer: C

Question 5

Jude, a pen tester working in Keiltech Ltd., performs sophisticated security testing on his company's network infrastructure to identify security loopholes. In this process, he started to circumvent the network protection tools and firewalls used in the company. He employed a technique that can create forged TCP sessions by carrying out multiple SYN, ACK, and RST or FIN packets. Further, this process allowed Jude to execute DDoS attacks that can exhaust the network resources. What is the attack technique used by Jude for finding loopholes in the above scenario? 

Options :
Answer: C

Viewing Page : 1 - 89
Practicing : 1 - 5 of 885 Questions

© Copyrights FreeMockExams 2026. All Rights Reserved

We use cookies to ensure that we give you the best experience on our website (FreeMockExams). If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the FreeMockExams.