EC-COUNCIL 312-50 CHFI EXAM Questions

EC-COUNCIL 312-50 CHFI EXAM Questions

The questions provided below are part of our premium content and are very useful for both practicing for the CHFI 312-50 Real Exam and getting an idea on how the premium content looks like.

We do out best to provide our users with as much content as possible and appreciate your support by using our products.

Please use the comment section to leave your thoughts and suggestions.



PDF&VCE with 632 Questions and Answers
VCE Simulator Included
30 Days Free Updates | 24×7 Support | Verified by Experts


Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?

A. Fast processor to help with network traffic analysis
B. They must be dual-homed
C. Similar RAM requirements
D. Fast network interface cards


Which of the following is an application that requires a host application for replication?

A. Micro
B. Worm
C. Trojan
D. Virus


A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?

A. Paros Proxy
B. BBProxy
C. BBCrack
D. Blooover


Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?

A. Restore a random file.
B. Perform a full restore.
C. Read the first 512 bytes of the tape.
D. Read the last 512 bytes of the tape.


Which of the following describes the characteristics of a Boot Sector Virus?

A. Moves the MBR to another location on the RAM and copies itself to the original location of the MBR
B. Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR
C. Modifies directory table entries so that directory entries point to the virus code instead of the actual program
D. Overwrites the original MBR and only executes the new virus code


Which statement is TRUE regarding network firewalls preventing Web Application attacks?

A. Network firewalls can prevent attacks because they can detect malicious HTTP traffic.
B. Network firewalls cannot prevent attacks because ports 80 and 443 must be opened.
C. Network firewalls can prevent attacks if they are properly configured.
D. Network firewalls cannot prevent attacks because they are too complex to configure.


Which of the following programs is usually targeted at Microsoft Office products?

A. Polymorphic virus
B. Multipart virus
C. Macro virus
D. Stealth virus


Bluetooth uses which digital modulation technique to exchange information between paired devices?

A. PSK (phase-shift keying)
B. FSK (frequency-shift keying)
C. ASK (amplitude-shift keying)
D. QAM (quadrature amplitude modulation)


In order to show improvement of security over time, what must be developed?

A. Reports
B. Testing tools
C. Metrics
D. Taxonomy of vulnerabilities


Passive reconnaissance involves collecting information through which of the following?

A. Social engineering
B. Network traffic sniffing
C. Man in the middle attacks
D. Publicly accessible sources


  1. Anonymous - Reply

    premium dumps are good, the support is friendly not much to add. Thx and will use again.

  2. Anonymous - Reply

    8xx but for 2 days for looking over the premium dumps it’s worth it.

  3. Anonymous - Reply

    Passed 9xx, very easy if you pay attention to what is asked. Questions are from the premium but had around 5 that had shuffled answers or reprhased questions but with same answers as in the dumps

  4. Hal Wetter - Reply

    Got my exam in 2 days, can anyone confirm if the premium are good?

Leave Comment

Your email address will not be published.