★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 312-50 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/312-50-dumps.html


Are you a new job hunter with out a EC-Council EC-Council 312-50 certification? If youre also busy on working, please get Pass4sures EC-Council training program. You will always be on the approach to EC-Council EC-Council certification easier as well as earlier. All of us provide the nearly all reliable as well as trustworthy materials. The EC-Council EC-Council 312-50 simulated tests are inside multiple choice which is the same as the actual test. Your EC-Council questions are supplied with verified answers. It is possible to download the analyze engine in your PC, and accomplish the EC-Council 312-50 exam dumps. Your test powerplant make you encounter the EC-Council 312-50 true exam.

2021 Nov ceh 312-50 pdf:

Q11. ____________ will let you assume a users identity at a dynamically generated web page or site. 

A. SQL attack 

B. Injection attack 

C. Cross site scripting 

D. The shell attack 

E. Winzapper 

Answer: C

Explanation: Cross site scripting is also referred to as XSS or CSS. You must know the user is online and you must scam that user into clicking on a link that you have sent in order for this hack attack to work. 


Q12. What are the different between SSL and S-HTTP? 

A. SSL operates at the network layer and S-HTTP operates at the application layer 

B. SSL operates at the application layer and S-HTTP operates at the network layer 

C. SSL operates at transport layer and S-HTTP operates at the application layer 

D. SSL operates at the application layer and S-HTTP operates at the transport layer 

Answer: C

Explanation: Whereas SSL is designed to establish a secure connection between two computers, S-HTTP is designed to send individual messages securely. S-HTTP is defined in RFC 2660 


Q13. Which of the following statements would not be a proper definition for a Trojan Horse? 

A. An unauthorized program contained within a legitimate program. 

This unauthorized program performs functions unknown (and probably unwanted) by the user. 

B. A legitimate program that has been altered by the placement of unauthorized code within it; this code perform functions unknown (and probably unwanted) by the user. 

C. An authorized program that has been designed to capture keyboard keystrokes while the user remains unaware of such an activity being performed. 

D. Any program that appears to perform a desirable and necessary function but that (because of unauthorized code within it that is unknown to the user) performs functions unknown (and definitely unwanted) by the user. 

Answer: C

Explanation: A Trojan is all about running unauthorized code on the users computer without the user knowing of it. 


Q14. _____ ensures that the enforcement of organizational security policy does not rely on voluntary web application user compliance. It secures information by assigning sensitivity labels on information and comparing this to the level of security a user is operating at. 

A. Mandatory Access Control 

B. Authorized Access Control 

C. Role-based Access Control 

D. Discretionary Access Control 

Answer: A

Explanation : In computer security, mandatory access control (MAC) is a kind of access control, defined by the TCSEC as "a means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (i.e., clearance) of subjects to access information of such sensitivity." 


Q15. Which port, when configured on a switch receives a copy of every packet that passes through it? 

A. R-DUPE Port 

B. MIRROR port 

C. SPAN port 

D. PORTMON 

Answer: C


Avant-garde ceh official certified ethical hacker review guide exam 312-50 pdf:

Q16. You are attempting to map out the firewall policy for an organization. You discover your target system is one hop beyond the firewall. Using hping2, you send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024. What is this process known as? 

A. Footprinting 

B. Firewalking 

C. Enumeration 

D. Idle scanning 

Answer: B

Explanation: Firewalking uses a traceroute-like IP packet analysis to determine whether or not a particular packet can pass from the attacker’s host to a destination host through a packet-filtering device. This technique can be used to map ‘open’ or ‘pass through’ ports on a gateway. More over, it can determine whether packets with various control information can pass through a given gateway. 


Q17. In an attempt to secure his 802.11b wireless network, Bob decides to use strategic antenna positioning. He places the antenna for the access point near the center of the building. For those access points near the outer edge of the building he uses semi-directional antennas that face towards the buildings center. There is a large parking lot and outlying filed surrounding the building that extends out half a mile around the building. Bob figures that with this and his placement of antennas, his wireless network will be safe from attack. Which of he following statements is true? 

A. Bob’s network will not be safe until he also enables WEP 

B. With the 300-foot limit of a wireless signal, Bob’s network is safe 

C. Bob’s network will be sage but only if he doesn’t switch to 802.11a 

D. Wireless signals can be detected from miles away; Bob’s network is not safe 

Answer: D

Explanation: It’s all depending on the capacity of the antenna that a potential hacker will use in order to gain access to the wireless net. 


Q18. Which of the following nmap command in Linux procedures the above output? 

A. sudo nmap –sP 192.168.0.1/24 

B. root nmap –sA 192.168.0.1/24 

C. run nmap –TX 192.168.0.1/24 

D. launch nmap –PP 192.168.0.1/24 

Answer: A

Explanation: This is an output from a ping scan. The option –sP will give you a ping scan of the 192.168.0.1/24 network. 

Topic 4, Enumeration 

129. Sandra has been actively scanning the client network on which she is doing a vulnerability assessment test. While conducting a port scan she notices open ports in the range of 135 to 139. What protocol is most likely to be listening on those ports? 

A. Finger 

B. FTP 

C. Samba 

D. SMB 

Answer: D

Explanation: The SMB (Server Message Block) protocol is used among other things for file sharing in Windows NT / 2000. In Windows NT it ran on top of NBT (NetBIOS over TCP/IP), which used the famous ports 137, 138 (UDP) and 139 (TCP). In Windows 2000, Microsoft added the possibility to run SMB directly over TCP/IP, without the extra layer of NBT. For this they use TCP port 445. 


Q19. Bob has been hired to perform a penetration test on ABC.com. He begins by looking at IP address ranges owned by the company and details of domain name registration. He then goes to News Groups and financial web sites to see if they are leaking any sensitive information of have any technical details online. 

Within the context of penetration testing methodology, what phase is Bob involved with? 

A. Passive information gathering 

B. Active information gathering 

C. Attack phase 

D. Vulnerability Mapping 

Answer: A

Explanation: He is gathering information and as long as he doesn’t make contact with any of the targets systems he is considered gathering this information in a passive mode. 


Q20. TCP packets transmitted in either direction after the initial three-way handshake will have which of the following bit set? 

A. SYN flag 

B. ACK flag 

C. FIN flag 

D. XMAS flag 

Answer: B