★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 312-50 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/312-50-dumps.html


Although every single product from Actualtests varies in complexity along with depth, all certification exams tend to be created specifically regarding customers along with cover core elements measuring technical knowledge. EC-Council 312-50 exam analyze candidates the technical expertise and practical skills in operate office. Just before you get a well-paid job in IT area, candidates must pass your technical exam and accept your EC-Council EC-Council certification.

2021 Mar 312-50 exams

Q11. Your lab partner is trying to find out more information about a competitors web site. The site has a .com extension. She has decided to use some online whois tools and look in one of the regional Internet registrys. Which one would you suggest she looks in first? 

A. LACNIC 

B. ARIN 

C. APNIC 

D. RIPE 

E. AfriNIC 

Answer: B

Explanation: Regional registries maintain records from the areas from which they govern. ARIN is responsible for domains served within North and South America and therefore, would be a good starting point for a .com domain. 


Q12. Exhibit: 

Given the following extract from the snort log on a honeypot, what do you infer from the attack? 

A. A new port was opened 

B. A new user id was created 

C. The exploit was successful 

D. The exploit was not successful 

Answer: D

Explanation: The attacker submits a PASS to the honeypot and receives a login incorrect before disconnecting. 


Q13. Fingerprinting an Operating System helps a cracker because: 

A. It defines exactly what software you have installed 

B. It opens a security-delayed window based on the port being scanned 

C. It doesn't depend on the patches that have been applied to fix existing security holes 

D. It informs the cracker of which vulnerabilities he may be able to exploit on your system 

Answer: D

Explanation: When a cracker knows what OS and Services you use he also knows which exploits might work on your system. If he would have to try all possible exploits for all possible Operating Systems and Services it would take too long time and the possibility of being detected increases. 


Q14. Name two software tools used for OS guessing.(Choose two. 

A. Nmap 

B. Snadboy 

C. Queso 

D. UserInfo 

E. NetBus 

Answer: AC

Explanation: Nmap and Queso are the two best-known OS guessing programs. OS guessing software has the ability to look at peculiarities in the way that each vendor implements the RFC's. These differences are compared with its database of known OS fingerprints. Then a best guess of the OS is provided to the user. 


Q15. Jeremy is web security consultant for Information Securitas. Jeremy has just been hired to perform contract work for a large state agency in Michigan. Jeremy's first task is to scan all the company's external websites. Jeremy comes upon a login page which appears to allow employees access to sensitive areas on the website. James types in the following statement in the username field: 

SELECT * from Users where username='admin' ?AND password='' AND email like '%@testers.com%' 

What will the SQL statement accomplish? 

A. If the page is susceptible to SQL injection, it will look in the Users table for usernames of admin 

B. This statement will look for users with the name of admin, blank passwords, and email addresses that end in @testers.com 

C. This Select SQL statement will log James in if there are any users with NULL passwords 

D. James will be able to see if there are any default user accounts in the SQL database 

Answer: A


Leading 312-50 sample question:

Q16. Vulnerability mapping occurs after which phase of a penetration test? 

A. Host scanning 

B. Passive information gathering 

C. Analysis of host scanning 

D. Network level discovery 

Answer: C

Explanation: The order should be Passive information gathering, Network level discovery, Host scanning and Analysis of host scanning. 


Q17. How do you defend against MAC attacks on a switch? 

A. Disable SPAN port on the switch 

B. Enable SNMP Trap on the switch 

C. Configure IP security on the switch 

D. Enable Port Security on the switch 

Answer: D


Q18. In an attempt to secure his 802.11b wireless network, Ulf decides to use a strategic antenna positioning. He places the antenna for the access points near the center of the building. For those access points near the outer edge of the building he uses semi-directional antennas that face towards the building’s center. There is a large parking lot and outlying filed surrounding the building that extends out half a mile around the building. Ulf figures that with this and his placement of antennas, his wireless network will be safe from attack. 

Which of the following statements is true? 

A. With the 300 feet limit of a wireless signal, Ulf’s network is safe. 

B. Wireless signals can be detected from miles away, Ulf’s network is not safe. 

C. Ulf’s network will be safe but only of he doesn’t switch to 802.11a. 

D. Ulf’s network will not be safe until he also enables WEP. 

Answer: D


Q19. John Beetlesman, the hacker has successfully compromised the Linux System of Agent Telecommunications, Inc’s WebServer running Apache. He has downloaded sensitive documents and database files off the machine. 

Upon performing various tasks, Beetlesman finally runs the following command on the Linux box before disconnecting. 

for ((i=0;i<1;i++));do 

?dd if=/dev/random of=/dev/hda && dd if=/dev/zero of=/dev/hda 

done 

What exactly is John trying to do? 

A. He is making a bit stream copy of the entire hard disk for later download 

B. He is deleting log files to remove his trace 

C. He is wiping the contents of the hard disk with zeros 

D. He is infecting the hard disk with random virus strings 

Answer:

Explanation: dd copies an input file to an output file with optional conversions. –if is input file, -of is output file. /dev/zero is a special file that provides as many null characters (ASCII NULL, 0x00; not ASCII character "digit zero", "0", 0x30) as are read from it. /dev/hda is the hard drive. 


Q20. ou wish to determine the operating system and type of web server being used. At the same time you wish to arouse no suspicion within the target organization. 

While some of the methods listed below work, which holds the least risk of detection? 

A. Make some phone calls and attempt to retrieve the information using social engineering. 

B. Use nmap in paranoid mode and scan the web server. 

C. Telnet to the web server and issue commands to illicit a response. 

D. Use the netcraft web site look for the target organization’s web site. 

Answer: D

Explanation: Netcraft is providing research data and analysis on many aspects of the Internet. Netcraft has explored the Internet since 1995 and is a respected authority on the market share of web servers, operating systems, hosting providers, ISPs, encrypted transactions, electronic commerce, scripting languages and content technologies on the internet.