★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 312-50 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/312-50-dumps.html


EC-Council 312-50 test is among the most very best qualifications from EC-Council and so your competitors is hard. But during EC-Council, an individuals advantages plus likely can get the ideal crack plus 312-50 may be the great means to this unique. Presented this fiercer plus fiercer competition in buying it globe, are you feeling good demand? Obviously, you choose to do. Then you?¡¥d better grab the EC-Council that will take your career. Nowadays, A growing number of The idea Qualifications usually are arrive becoming that will in life. For instance EC-Council 312-50 Accreditation. But exactly how to join this unique qualifications? Pass4sure can provide solution.

2021 Sep ethical hacking and countermeasures exam 312-50:

Q301. Bob is doing a password assessment for one of his clients. Bob suspects that security policies are not in place. He also suspects that weak passwords are probably the norm throughout the company he is evaluating. Bob is familiar with password weaknesses and key loggers. 

Which of the following options best represents the means that Bob can adopt to retrieve passwords from his clients hosts and servers. 

A. Hardware, Software, and Sniffing. 

B. Hardware and Software Keyloggers. 

C. Passwords are always best obtained using Hardware key loggers. 

D. Software only, they are the most effective. 

Answer: A

Explanation: Different types of keylogger planted into the environment would retrieve the passwords for Bob.. 


Q302. You are the security administrator of Jaco Banking Systems located in Boston. You are setting up e-banking website (http://www.ejacobank.com) authentication system. Instead of issuing banking customer with a single password, you give them a printed list of 100 unique passwords. Each time the customer needs to log into the e-banking system website, the customer enters the next password on the list. If someone sees them type the password using shoulder surfing, MiTM or keyloggers, then no damage is done because the password will not be accepted a second time. Once the list of 100 passwords is almost finished, the system automatically sends out a new password list by encrypted e-mail to the customer. 

You are confident that this security implementation will protect the customer from password abuse. 

Two months later, a group of hackers called "HackJihad" found a way to access the one-time password list issued to customers of Jaco Banking Systems. The hackers set up a fake website (http://www.e-jacobank.com) and used phishing attacks to direct ignorant customers to it. The fake website asked users for their e-banking username and password, and the next unused entry from their one-time password sheet. The hackers collected 200 customer's username/passwords this way. They transferred money from the customer's bank account to various offshore accounts. 

Your decision of password policy implementation has cost the bank with USD 925,000 to hackers. You immediately shut down the e-banking website while figuring out the next best security solution 

What effective security solution will you recommend in this case? 

A. Implement Biometrics based password authentication system. Record the customers face image to the authentication database 

B. Configure your firewall to block logon attempts of more than three wrong tries 

C. Enable a complex password policy of 20 characters and ask the user to change the password immediately after they logon and do not store password histories 

D. Implement RSA SecureID based authentication system 

Answer: D


Q303. What are twp types of ICMP code used when using the ping command? 

A. It uses types 0 and 8. 

B. It uses types 13 and 14. 

C. It uses types 15 and 17. 

D. The ping command does not use ICMP but uses UDP. 

Answer: A

Explanation: ICMP Type 0 = Echo Reply, ICMP Type 8 = Echo 


Q304. What type of cookies can be generated while visiting different web sites on the Internet? 

A. Permanent and long term cookies. 

B. Session and permanent cookies. 

C. Session and external cookies. 

D. Cookies are all the same, there is no such thing as different type of cookies. 

Answer: B

Explanation: There are two types of cookies: a permanent cookie that remains on a visitor's computer for a given time and a session cookie the is temporarily saved in the visitor's computer memory during the time that the visitor is using the Web site. Session cookies disappear when you close your Web browser. 


Q305. Microsoft Authenticode technology is used for: 

A. Digital Signing Activex controls 

B. Digitally signing SSL Certificates 

C. Digitally Signing JavaScript Files 

D. Digitally Signing Java Applets 

Answer: A

Explanation: Authenticode identifies the publisher of signed software and verifies that it hasn't been tampered with, before users download software to their PCs. As a result, end users can make a more informed decision as to whether or not to download code. Authenticode relies on digital certificates and is based on specifications that have been used successfully in the industry for some time, including Public Key Cryptography Standards (PKCS) #7 (encrypted key specification), PKCS #10 (certificate request formats), X.509 (certificate specification), and Secure Hash Algorithm (SHA) and MD5 hash algorithms. 


312-50 free practice test

Far out ethical hacking and countermeasures exam 312-50:

Q306. Neil is closely monitoring his firewall rules and logs on a regular basis. Some of the users have complained to Neil that there are a few employees who are visiting offensive web site during work hours, without any consideration for others. Neil knows that he has an up-to-date content filtering system and such access should not be authorized. What type of technique might be used by these offenders to access the Internet without restriction? 

A. They are using UDP that is always authorized at the firewall 

B. They are using an older version of Internet Explorer that allow them to bypass the proxy server 

C. They have been able to compromise the firewall, modify the rules, and give themselves proper access 

D. They are using tunneling software that allows them to communicate with protocols in a way it was not intended 

Answer: D

Explanation: This can be accomplished by, for example, tunneling the http traffic over SSH if you have a SSH server answering to your connection, you enable dynamic forwarding in the ssh client and configure Internet Explorer to use a SOCKS Proxy for network traffic. 


Q307. Steven is a senior security analyst for a state agency in Tulsa, Oklahoma. His agency is currently undergoing a mandated security audit by an outside consulting firm. The consulting firm is halfway through the audit and is preparing to perform the actual penetration testing against the agency’s network. The firm first sets up a sniffer on the agency’s wired network to capture a reasonable amount of traffic to analyze later. This takes approximately 2 hours to obtain 10 GB of data. The consulting firm then sets up a sniffer on the agency’s wireless network to capture the same amount of traffic. This capture only takes about 30 minutes to get 10 GB of data. 

Why did capturing of traffic take much less time on the wireless network? 

A. Because wireless access points act like hubs on a network 

B. Because all traffic is clear text, even when encrypted 

C. Because wireless traffic uses only UDP which is easier to sniff 

D. Because wireless networks can’t enable encryption 

Answer: A

Explanation: You can not have directed radio transfers over a WLAN. Every packet will be broadcasted as far as possible with no concerns about who might hear it. 


Q308. Which of the following is most effective against passwords ? 

Select the Answer: 

A. Dictionary Attack 

B. BruteForce attack 

C. Targeted Attack 

D. Manual password Attack 

Answer: B

Explanation: The most effective means of password attack is brute force, in a brute force attack the program will attempt to use every possible combination of characters. While this takes longer then a dictionary attack, which uses a text file of real words, it is always capable of breaking the password. 


Q309. Exhibit: 


What type of attack is shown in the above diagram? 

A. SSL Spoofing Attack 

B. Identity Stealing Attack 

C. Session Hijacking Attack 

D. Man-in-the-Middle (MiTM) Attack 

Answer: D

Explanation: A man-in-the-middle attack (MITM) is an attack in which an attacker is able to read, insert and modify at will, messages between two parties without either party knowing that the link between them has been compromised. 


Q310. Attackers footprint target Websites using Google Hacking techniques. Google hacking is a term that refers to the art of creating complex search engine queries. It detects websites that are vulnerable to numerous exploits and vulnerabilities. Google operators are used to locate specific strings of text within the search results. 

The configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database. WordPress uses config.php that stores the database Username and Password. 

Which of the below Google search string brings up sites with "config.php" files? 


A. Search:index config/php 

B. Wordpress:index config.php 

C. intitle:index.of config.php 

D. Config.php:index list 

Answer: C