★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 312-50 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/312-50-dumps.html


It is impossible to pass EC-Council 312-50 exam without any help in the short term. Come to Pass4sure soon and find the most advanced, correct and guaranteed EC-Council 312-50 practice questions. You will get a surprising result by our Updated Ethical Hacking and Countermeasures (CEHv6) practice guides.

Q171. A digital signature is simply a message that is encrypted with the public key instead of the private key. 

A. True 

B. False 

Answer: B

Explanation: Digital signatures enable the recipient of information to verify the authenticity of the information's origin, and also verify that the information is intact. Thus, public key digital signatures provide authentication and data integrity. A digital signature also provides non-repudiation, which means that it prevents the sender from claiming that he or she did not actually send the information. Instead of encrypting information using someone else's public key, you encrypt it with your private key. If the information can be decrypted with your public key, then it must have originated with you. 


Q172. A distributed port scan operates by: 

A. Blocking access to the scanning clients by the targeted host 

B. Using denial-of-service software against a range of TCP ports 

C. Blocking access to the targeted host by each of the distributed scanning clients 

D. Having multiple computers each scan a small number of ports, then correlating the results 

Answer: D

Explanation: Think of dDoS (distributed Denial of Service) where you use a large number of computers to create simultaneous traffic against a victim in order to shut them down. 


Q173. A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) then it was intended to hold. 

What is the most common cause of buffer overflow in software today? 

A. Bad permissions on files. 

B. High bandwidth and large number of users. 

C. Usage of non standard programming languages. 

D. Bad quality assurance on software produced. 

Answer: D

Explanation: Technically, a buffer overflow is a problem with the program's internal implementation. 


Q174. Exhibit: 

Please study the exhibit carefully. 

Which Protocol maintains the communication on that way? 

A. UDP 

B. IP 

C. TCP 

D. ARP 

E. RARP 

Answer: C

Explanation: A TCP connection is always initiated with the 3-way handshake, which establishes and negotiates the actual connection over which data will be sent. 


Q175. You want to perform advanced SQL Injection attack against a vulnerable website. You are unable to perform command shell hacks on this server. What must be enabled in SQL Server to launch these attacks? 

A. System services 

B. EXEC master access 

C. xp_cmdshell 

D. RDC 

Answer: C


Q176. Which of the following tool would be considered as Signature Integrity Verifier (SIV)? 

A. Nmap 

B. SNORT 

C. VirusSCAN 

D. Tripwire 

Answer: D


Q177. You are writing security policy that hardens and prevents Footprinting attempt by Hackers. Which of the following countermeasures will NOT be effective against this attack? 

A. Configure routers to restrict the responses to Footprinting requests 

B. Configure Web Servers to avoid information leakage and disable unwanted protocols 

C. Lock the ports with suitable Firewall configuration 

D. Use an IDS that can be configured to refuse suspicious traffic and pick up Footprinting patterns 

E. Evaluate the information before publishing it on the Website/Intranet 

F. Monitor every employee computer with Spy cameras, keyloggers and spy on them 

G. Perform Footprinting techniques and remove any sensitive information found on DMZ sites 

H. Prevent search engines from caching a Webpage and use anonymous registration services 

I. Disable directory and use split-DNS 

Answer: F


Q178. This method is used to determine the Operating system and version running on a remote target system. What is it called? 

A. Service Degradation 

B. OS Fingerprinting 

C. Manual Target System 

D. Identification Scanning 

Answer: B


Q179. Your company trainee Sandra asks you which are the four existing Regional Internet Registry (RIR's)? 

A. APNIC, PICNIC, ARIN, LACNIC 

B. RIPE NCC, LACNIC, ARIN, APNIC 

C. RIPE NCC, NANIC, ARIN, APNIC 

D. RIPE NCC, ARIN, APNIC, LATNIC 

Answer: B

Explanation: All other answers include non existing organizations (PICNIC, NANIC, LATNIC). See http://www.arin.net/library/internet_info/ripe.html 


Q180. Jeffery works at a large financial firm in Dallas, Texas as a securities analyst. Last week, the IT department of his company installed a wireless network throughout the building. The problem is, is that they are only going to make it available to upper management and the IT department. 

Most employees don't have a problem with this since they have no need for wireless networking, but Jeffery would really like to use wireless since he has a personal laptop that he works from as much as he can. Jeffery asks the IT manager if he could be allowed to use the wireless network but he is turned down. Jeffery is not satisfied, so he brings his laptop in to work late one night and tries to get access to the network. Jeffery uses the wireless utility on his laptop, but cannot see any wireless networks available. After about an hour of trying to figure it out, Jeffery cannot get on the company's wireless network. Discouraged, Jeffery leaves the office and goes home. 

The next day, Jeffery calls his friend who works with computers. His friend suggests that his IT department might have turned off SSID broadcasting, and that is why he could not see any wireless networks. How would Jeffrey access the wireless network? 

A. Run WEPCrack tool and brute force the SSID hashes 

B. Jam the wireless signal by launching denial of service attack 

C. Sniff the wireless network and capture the SSID that is transmitted over the wire in plaintext 

D. Attempt to connect using wireless device default SSIDs 

Answer: C