★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 312-50 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/312-50-dumps.html


The EC-Council 312-50 exam is probably the EC-Council certification exams. It examines the particular candidates abilities as well as skills for you to operate as well as troubleshoot a network. Candidates could take the particular EC-Council EC-Council exam training training course at Exambible to get certified. The EC-Council 312-50 training course includes printable Pdf courseware as well as downloadable test serp; exclusive learning zone which you can communicate with other candidates; reside chat with the instructors at anytime round the clock; passing guarantee which have information proof; one year free upgrades policy.

2021 Nov ec-council certified ethical hacker exam 312-50 cost:

Q451. Nathalie would like to perform a reliable scan against a remote target. She is not concerned about being stealth at this point. Which of the following type of scans would be the most accurate and reliable? 

A. A FIN Scan 

B. A Half Scan 

C. A UDP Scan 

D. The TCP Connect Scan 

Answer: D

Explanation: The connect() system call provided by your operating system is used to open a connection to every interesting port on the machine. If the port is listening, connect() will succeed, otherwise the port isn't reachable. One strong advantage to this technique is that you don't need any special privileges. This is the fastest scanning method supported by nmap, and is available with the -t (TCP) option. The big downside is that this sort of scan is easily detectable and filterable. 


Q452. Carl has successfully compromised a web server from behind a firewall by exploiting a vulnerability in the web server program. He wants to proceed by installing a backdoor program. However, he is aware that not all inbound ports on the firewall are in the open state. 

From the list given below, identify the port that is most likely to be open and allowed to reach the server that Carl has just compromised. 

A. 53 

B. 110 

C. 25 

D. 69 

Answer: A

Explanation: Port 53 is used by DNS and is almost always open, the problem is often that the port is opened for the hole world and not only for outside DNS servers. 


Q453. _______ is one of the programs used to wardial. 

A. DialIT 

B. Netstumbler 

C. TooPac 

D. Kismet 

E. ToneLoc 

Answer: E

Explanation: ToneLoc is one of the programs used to wardial. While this is considered an "old school" technique, it is still effective at finding backdoors and out of band network entry points. 


Q454. A Company security System Administrator is reviewing the network system log files. He notes the following: 

-Network log files are at 5 MB at 12:00 noon. 

-At 14:00 hours, the log files at 3 MB. 

What should he assume has happened and what should he do about the situation? 

A. He should contact the attacker’s ISP as soon as possible and have the connection disconnected. 

B. He should log the event as suspicious activity, continue to investigate, and take further steps according to site security policy. 

C. He should log the file size, and archive the information, because the router crashed. 

D. He should run a file system check, because the Syslog server has a self correcting file system problem. 

E. He should disconnect from the Internet discontinue any further unauthorized use, because an attack has taken place. 

Answer: B

Explanation: You should never assume a host has been compromised without verification. Typically, disconnecting a server is an extreme measure and should only be done when it is confirmed there is a compromise or the server contains such sensitive data that the loss of service outweighs the risk. Never assume that any administrator or automatic process is making changes to a system. Always investigate the root cause of the change on the system and follow your organizations security policy. 


Q455. Exhibit 

You receive an e-mail with the message displayed in the exhibit. 

From this e-mail you suspect that this message was sent by some hacker since you have using their e-mail services for the last 2 years and they never sent out an e-mail as this. You also observe the URL in the message and confirm your suspicion about 340590649. You immediately enter the following at the Windows 2000 command prompt. 

ping 340590649 

You get a response with a valid IP address. What is the obstructed IP address in the e-mail URL? 

A. 192.34.5.9 

B. 10.0.3.4 

C. 203.2.4.5 

D. 199.23.43.4 

Answer: C

Explanation: Convert the number in binary, then start from last 8 bits and convert them to decimal to get the last octet (in this case .5) 


Renovate ceh official certified ethical hacker review guide exam 312-50 pdf:

Q456. This kind of password cracking method uses word lists in combination with numbers and special characters: 

A. Hybrid 

B. Linear 

C. Symmetric 

D. Brute Force 

Answer: A

Explanation: A Hybrid (or Hybrid Dictionary) Attack uses a word list that it modifies slightly to find passwords that are almost from a dictionary (like St0pid) 


Q457. Bill has started to notice some slowness on his network when trying to update his company’s website while trying to access the website from the Internet. Bill asks the help desk manager if he has received any calls about slowness from the end users, but the help desk manager says that he has not. Bill receives a number of calls from customers that can’t access the company website and can’t purchase anything online. Bill logs on to a couple of this routers and notices that the logs shows network traffic is at all time high. He also notices that almost all the traffic is originating from a specific address. 

Bill decides to use Geotrace to find out where the suspect IP is originates from. The Geotrace utility runs a traceroute and finds that IP is coming from Panama. Bill knows that none of his customers are in Panama so he immediately thinks that his company is under a Denial of Service attack. Now Bill needs to find out more about the originating IP Address. 

What Internet registry should Bill look in to find the IP Address? 

A. LACNIC 

B. ARIN 

C. RIPELACNIC 

D. APNIC 

Answer: A

Explanation: LACNIC is the Latin American and Caribbean Internet Addresses Registry that administers IP addresses, autonomous system numbers, reverse DNS, and other network resources for that region. 


Q458. Sandra is conducting a penetration test for ABC.com. She knows that ABC.com is using wireless networking for some of the offices in the building right down the street. Through social engineering she discovers that they are using 802.11g. Sandra knows that 802.11g uses the same 2.4GHz frequency range as 802.11b. Using NetStumbler and her 802.11b wireless NIC, Sandra drives over to the building to map the wireless networks. However, even though she repositions herself around the building several times, Sandra is not able to detect a single AP. 

What do you think is the reason behind this? 

A. Netstumbler does not work against 802.11g. 

B. You can only pick up 802.11g signals with 802.11a wireless cards. 

C. The access points probably have WEP enabled so they cannot be detected. 

D. The access points probably have disabled broadcasting of the SSID so they cannot be detected. 

E. 802.11g uses OFDM while 802.11b uses DSSS so despite the same frequency and 802.11b card cannot see an 802.11g signal. 

F. Sandra must be doing something wrong, as there is no reason for her to not see the signals. 

Answer: D

Explanation: Netstumbler can not detect networks that do not respond to broadcast requests. 


Q459. Your lab partner is trying to find out more information about a competitors web site. The site has a .com extension. She has decided to use some online whois tools and look in one of the regional Internet registrys. Which one would you suggest she looks in first? 

A. LACNIC 

B. ARIN 

C. APNIC 

D. RIPE 

E. AfriNIC 

Answer: B

Explanation: Regional registries maintain records from the areas from which they govern. ARIN is responsible for domains served within North and South America and therefore, would be a good starting point for a .com domain. 


Q460. You are the Security Administrator of Xtrinity, Inc. You write security policies and conduct assesments to protect the company's network. During one of your periodic checks to see how well policy is being observed by the employees, you discover an employee has attached a modem to his telephone line and workstation. He has used this modem to dial in to his workstation, thereby bypassing your firewall. A security breach has occurred as a direct result of this activity. The employee explains that he used the modem because he had to download software for a department project. How would you resolve this situation? 

A. Reconfigure the firewall 

B. Conduct a needs analysis 

C. Install a network-based IDS 

D. Enforce the corporate security policy 

Answer: D

Explanation: The security policy is meant to always be followed until changed. If a need rises to perform actions that might violate the security policy you’ll have to find another way to accomplish the task or wait until the policy has been changed.