★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 312-50 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/312-50-dumps.html


It is impossible to pass EC-Council 312-50 exam without any help in the short term. Come to Testking soon and find the most advanced, correct and guaranteed EC-Council 312-50 practice questions. You will get a surprising result by our Updated Ethical Hacking and Countermeasures (CEHv6) practice guides.

2021 Dec 312-50 vce:

Q211. What file system vulnerability does the following command take advantage of? 

type c:\anyfile.exe > c:\winnt\system32\calc.exe:anyfile.exe 

A. HFS 

B. ADS 

C. NTFS 

D. Backdoor access 

Answer: B

Explanation: ADS (or Alternate Data Streams) is a “feature” in the NTFS file system that makes it possible to hide information in alternate data streams in existing files. The file can have multiple data streams and the data streams are accessed by filename:stream. 


Q212. Samantha has been actively scanning the client network for which she is doing a vulnerability assessment test. While doing a port scan she notices ports open in the 135 to 139 range. What protocol is most likely to be listening on those ports? 

A. SMB 

B. FTP 

C. SAMBA 

D. FINGER 

Answer: A

Explanation: Port 135 is for RPC and 136-139 is for NetBIOS traffic. SMB is an upper layer service that runs on top of the Session Service and the Datagram service of NetBIOS. 


Q213. What does a type 3 code 13 represent?(Choose two. 

A. Echo request 

B. Destination unreachable 

C. Network unreachable 

D. Administratively prohibited 

E. Port unreachable 

F. Time exceeded 

Answer: BD

Explanation: Type 3 code 13 is destination unreachable administratively prohibited. This type of message is typically returned from a device blocking a port. 


Q214. You have been using the msadc.pl attack script to execute arbitrary commands on an NT4 web server. While it is effective, you find it tedious to perform extended functions. On further research you come across a perl script that runs the following msadc functions: 

What kind of exploit is indicated by this script? 

A. A buffer overflow exploit. 

B. A SUID exploit. 

C. A SQL injection exploit. 

D. A chained exploit. 

E. A buffer under run exploit. 

Answer: D


Q215. What techniques would you use to evade IDS during a Port Scan? (Select 4 answers) 

A. Use fragmented IP packets 

B. Spoof your IP address when launching attacks and sniff responses from the server 

C. Overload the IDS with Junk traffic to mask your scan 

D. Use source routing (if possible) 

E. Connect to proxy servers or compromised Trojaned machines to launch attacks 

Answer: ABDE


Refresh ceh 312-50 exam price:

Q216. WinDump is a popular sniffer which results from the porting to Windows of TcpDump for Linux. What library does it use ? 

A. LibPcap 

B. WinPcap 

C. Wincap 

D. None of the above 

Answer: B

Explanation: WinPcap is the industry-standard tool for link-layer network access in Windows environments: it allows applications to capture and transmit network packets bypassing the protocol stack, and has additional useful features, including kernel-level packet filtering, a network statistics engine and support for remote packet capture. 


Q217. You are writing security policy that hardens and prevents Footprinting attempt by Hackers. Which of the following countermeasures will NOT be effective against this attack? 

A. Configure routers to restrict the responses to Footprinting requests 

B. Configure Web Servers to avoid information leakage and disable unwanted protocols 

C. Lock the ports with suitable Firewall configuration 

D. Use an IDS that can be configured to refuse suspicious traffic and pick up Footprinting patterns 

E. Evaluate the information before publishing it on the Website/Intranet 

F. Monitor every employee computer with Spy cameras, keyloggers and spy on them 

G. Perform Footprinting techniques and remove any sensitive information found on DMZ sites 

H. Prevent search engines from caching a Webpage and use anonymous registration services 

I. Disable directory and use split-DNS 

Answer: F


Q218. You establish a new Web browser connection to Google. Since a 3-way handshake is required for any TCP connection, the following actions will take place. 

-DNS query is sent to the DNS server to resolve www.google.com 

-DNS server replies with the IP address for Google? 

-SYN packet is sent to Google. 

-Google sends back a SYN/ACK packet 

-Your computer completes the handshake by sending an ACK 

-The connection is established and the transfer of data commences 

Which of the following packets represent completion of the 3-way handshake? 

A. 4th packet 

B. 3rdpacket 

C. 6th packet 

D. 5th packet 

Answer: D


Q219. Which of the following is not an effective countermeasure against replay attacks? 

A. Digital signatures 

B. Time Stamps 

C. System identification 

D. Sequence numbers 

Answer: C

Explanation: A replay attack is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. Effective countermeasures should be anything that makes it hard to delay or replay the packet (time stamps and sequence numbers) or anything that prove the package is received as it was sent from the original sender (digital signature) 


Q220. Because UDP is a connectionless protocol: (Select 2) 

A. UDP recvfrom() and write() scanning will yield reliable results 

B. It can only be used for Connect scans 

C. It can only be used for SYN scans 

D. There is no guarantee that the UDP packets will arrive at their destination 

E. ICMP port unreachable messages may not be returned successfully 

Answer: DE

Explanation: Neither UDP packets, nor the ICMP errors are guaranteed to arrive, so UDP scanners must also implement retransmission of packets that appear to be lost (or you will get a bunch of false positives).