★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 312-50 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/312-50-dumps.html


Exam Code: 312-50 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Ethical Hacking and Countermeasures (CEHv6)
Certification Provider: EC-Council
Free Today! Guaranteed Training- Pass 312-50 Exam.

2021 Sep ceh 312-50 pdf:

Q331. Which type of scan does not open a full TCP connection? 

A. Stealth Scan 

B. XMAS Scan 

C. Null Scan 

D. FIN Scan 

Answer: A

Explanation: Stealth Scan: Instead of completing the full TCP three-way-handshake a full connection is not made. A SYN packet is sent to the system and if a SYN/ACK packet is received it is assumed that the port on the system is active. In that case a RST/ACK will be sent which will determined the listening state the system is in. If a RST/ACK packet is received, it is assumed that the port on the system is not active. 


Q332. Which of the following best describes Vulnerability? 

A. The loss potential of a threat 

B. An action or event that might prejudice security 

C. An agent that could take advantage of a weakness 

D. A weakness or error that can lead to compromise 

Answer: D

Explanation: A vulnerability is a flaw or weakness in system security procedures, design or implementation that could be exercised (accidentally triggered or intentionally exploited) and result in a harm to an IT system or activity. 


Q333. John runs a Web Server, IDS and firewall on his network. Recently his Web Server has been under constant hacking attacks. He looks up the IDS log files and sees no Intrusion attempts but the web server constantly locks up and needs rebooting due to various brute force and buffer overflow attacks but still the IDS alerts no intrusion whatsoever. 

John become suspicious and views he firewall logs and he notices huge SSL connections constantly hitting web server. 

Hackers have been using the encrypted HTTPS protocol to send exploits to the web server and that was the reason the IDS did not detect the intrusions. 

How would Jon protect his network form these types of attacks? 

A. Install a proxy server and terminate SSL at the proxy 

B. Install a hardware SSL “accelerator” and terminate SSL at this layer 

C. Enable the IDS to filter encrypted HTTPS traffic 

D. Enable the firewall to filter encrypted HTTPS traffic 

Answer: AB

Explanation: By terminating the SSL connection at a proxy or a SSL accelerator and then use clear text the distance between the proxy/accelerator and the server, you make it possible for the IDS to scan the traffic. 

Topic 20, Buffer Overflows 


Q334. Which of the following tool would be considered as Signature Integrity Verifier (SIV)? 

A. Nmap 

B. SNORT 

C. VirusSCAN 

D. Tripwire 

Answer: D


Q335. Fred is the network administrator for his company. Fred is testing an internal switch. From an external IP address, Fred wants to try and trick this switch into thinking it already has established a session with his computer. How can Fred accomplish this? 

A. Fred can accomplish this by sending an IP packet with the RST/SIN bit and the source address of his computer. 

B. He can send an IP packet with the SYN bit and the source address of his computer. 

C. Fred can send an IP packet with the ACK bit set to zero and the source address of the switch. 

D. Fred can send an IP packet to the switch with the ACK bit and the source address of his machine. 

Answer: D


312-50 exam cost

Leading ceh 312-50 exam price:

Q336. While examining audit logs, you discover that people are able to telnet into the SMTP server on port 25. You would like to block this, though you do not see any evidence of an attack or other wrong doing. However, you are concerned about affecting the normal functionality of the email server. From the following options choose how best you can achieve this objective? 

A. Block port 25 at the firewall. 

B. Shut off the SMTP service on the server. 

C. Force all connections to use a username and password. 

D. Switch from Windows Exchange to UNIX Sendmail. 

E. None of the above. 

Answer: E

Explanation: Blocking port 25 in the firewall or forcing all connections to use username and password would have the consequences that the server is unable to communicate with other SMTP servers. Turning of the SMTP service would disable the email function completely. All email servers use SMTP to communicate with other email servers and therefore changing email server will not help. 


Q337. Samantha was hired to perform an internal security test of company. She quickly realized that all networks are making use of switches instead of traditional hubs. This greatly limits her ability to gather information through network sniffing. 

Which of the following techniques can she use to gather information from the switched network or to disable some of the traffic isolation features of the switch? (Choose two) 

A. Ethernet Zapping 

B. MAC Flooding 

C. Sniffing in promiscuous mode 

D. ARP Spoofing 

Answer: BD

Explanation: In a typical MAC flooding attack, a switch is flooded with packets, each containing different source MAC addresses. The intention is to consume the limited memory set aside in the switch to store the MAC address-to-physical port translation table.The result of this attack causes the switch to enter a state called failopen mode, in which all incoming packets are broadcast out on all ports (as with a hub), instead of just down the correct port as per normal operation. The principle of ARP spoofing is to send fake, or 'spoofed', ARP messages to an Ethernet LAN. These frames contain false MAC addresses, confusing network devices, such as network switches. As a result frames intended for one machine can be mistakenly sent to another (allowing the packets to be sniffed) or an unreachable host (a denial of service attack). 


Q338. Hackers usually control Bots through: 

A. IRC Channel 

B. MSN Messenger 

C. Trojan Client Software 

D. Yahoo Chat 

E. GoogleTalk 

Answer: A

Explanation: Most of the bots out today has a function to connect to a predetermined IRC channel in order to get orders. 


Q339. Keystroke logging is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. 



How will you defend against hardware keyloggers when using public computers and Internet Kiosks? (Select 4 answers) 

A. Alternate between typing the login credentials and typing characters somewhere else in the focus window 

B. Type a wrong password first, later type the correct password on the login page defeating the keylogger recording 

C. Type a password beginning with the last letter and then using the mouse to move the cursor for each subsequent letter. 

D. The next key typed replaces selected text portion. E.g. if the password is "secret", one could type "s", then some dummy keys "asdfsd". 

Then these dummies could be selected with mouse, and next character from the password "e" is typed, which replaces the dummies "asdfsd" 

E. The next key typed replaces selected text portion. E.g. if the password is "secret", one could type "s", then some dummy keys "asdfsd". Then these dummies could be selected with mouse, and next character from the password "e" is typed, which replaces the dummies "asdfsd" 

Answer: ACDE 


Q340. Which of the following activities would not be considered passive footprinting? 

A. Search on financial site such as Yahoo Financial 

B. Perform multiple queries through a search engine 

C. Scan the range of IP address found in their DNS database 

D. Go through the rubbish to find out any information that might have been discarded 

Answer: C

Explanation: Passive footprinting is a method in which the attacker never makes contact with the target. Scanning the targets IP addresses can be logged at the target and therefore contact has been made.