312-50 Guide

312-50 Exam Royal Pack (In Stock.)

 
  • EC-Council
  • Exam Number/Code 312-50
  • Product Name Ethical Hacking and Countermeasures (CEHv6)
  • Questions and Answers
  • 765 Q&As
  • Last Updated
  • July 24,2017
  • List Price
  • $128.99
  • Price
  • Today 59.99 USD

Free TrialVersion: demo Buy Now 50% OFF

[Tested] 312-50 EC-Council test 391-400 (Jul 2017)

Ucertify offers free demo for 312-50 exam. "Ethical Hacking and Countermeasures (CEHv6)", also known as 312-50 exam, is a EC-Council Certification. This set of posts, Passing the EC-Council 312-50 exam, will help you answer those questions. The 312-50 Questions & Answers covers all the knowledge points of the real exam. 100% real EC-Council 312-50 exams and revised by experts!

Q391. Eve is spending her day scanning the library computers. She notices that Alice is using a computer whose port 445 is active and listening. Eve uses the ENUM tool to enumerate Alice machine. From the command prompt, she types the following command. 

For /f "tokens=1 %%a in (hackfile.txt) do net use * \\\\10.1.2.3\\c$ /user:"Administrator" %%a 

What is Eve trying to do? 

A. Eve is trying to connect as an user with Administrator privileges 

B. Eve is trying to enumerate all users with Administrative privileges 

C. Eve is trying to carry out a password crack for user Administrator 

D. Eve is trying to escalate privilege of the null user to that of Administrator 

Answer: C

Explanation: Eve tries to get a successful login using the username Administrator and passwords from the file hackfile.txt. 


Q392. ViruXine.W32 virus hides their presence by changing the underlying executable code. This Virus code mutates while keeping the original algorithm intact, the code changes itself each time it runs, but the function of the code (its semantics) will not change at all. 

Here is a section of the Virus code: 

What is this technique called? 

A. Polymorphic Virus 

B. Metamorphic Virus 

C. Dravidic Virus 

D. Stealth Virus 

Answer: A


Q393. This TCP flag instructs the sending system to transmit all buffered data immediately. 

A. SYN 

B. RST 

C. PSH 

D. URG 

E. FIN 

Answer: C


Q394. In an attempt to secure his 802.11b wireless network, Ulf decides to use a strategic antenna positioning. He places the antenna for the access points near the center of the building. For those access points near the outer edge of the building he uses semi-directional antennas that face towards the building’s center. There is a large parking lot and outlying filed surrounding the building that extends out half a mile around the building. Ulf figures that with this and his placement of antennas, his wireless network will be safe from attack. 

Which of the following statements is true? 

A. With the 300 feet limit of a wireless signal, Ulf’s network is safe. 

B. Wireless signals can be detected from miles away, Ulf’s network is not safe. 

C. Ulf’s network will be safe but only of he doesn’t switch to 802.11a. 

D. Ulf’s network will not be safe until he also enables WEP. 

Answer: D


Q395. While attempting to discover the remote operating system on the target computer, you receive the following results from an nmap scan: 

Starting nmap V. 3.10ALPHA9 ( www.insecure.org/nmap/ <http://www.insecure.org/nmap/> ) Interesting ports on 172.121.12.222: (The 1592 ports scanned but not shown below are in state: filtered) Port State Service 21/tcp open ftp 25/tcp open smtp 53/tcp closed domain 80/tcp open http 443/tcp open https Remote operating system guess: Too many signatures match to reliably guess the OS. Nmap run completed -- 1 IP address (1 host up) scanned in 277.483 seconds 

What should be your next step to identify the OS? 

A. Perform a firewalk with that system as the target IP 

B. Perform a tcp traceroute to the system using port 53 

C. Run an nmap scan with the -v-v option to give a better output 

D. Connect to the active services and review the banner information 

Answer: D

Explanation: Most people don’t care about changing the banners presented by applications listening to open ports and therefore you should get fairly accurate information when grabbing banners from open ports with, for example, a telnet application. 


Q396. Which of the following type of scanning utilizes automated process of proactively identifying vulnerabilities of the computing systems present on a network? 

A. Port Scanning 

B. Single Scanning 

C. External Scanning 

D. Vulnerability Scanning 

Answer: D


Q397. Jess the hacker runs L0phtCrack’s built-in sniffer utility which grabs SMB password hashes and stores them for offline cracking. Once cracked, these passwords can provide easy access to whatever network resources the user account has access to. 

But Jess is not picking up hashed from the network. 

Why? 

A. The network protocol is configured to use SMB Signing. 

B. The physical network wire is on fibre optic cable. 

C. The network protocol is configured to use IPSEC. 

D. L0phtCrack SMB filtering only works through Switches and not Hubs. 

Answer: A

Explanation: To protect against SMB session hijacking, NT supports a cryptographic integrity mechanism, SMB Signing, to prevent active network taps from interjecting themselves into an already established session. 


Q398. Bob, an Administrator at company was furious when he discovered that his buddy Trent, has launched a session hijack attack against his network, and sniffed on his communication, including administrative tasks suck as configuring routers, firewalls, IDS, via Telnet. 

Bob, being an unhappy administrator, seeks your help to assist him in ensuring that attackers such as Trent will not be able to launch a session hijack in company. 

Based on the above scenario, please choose which would be your corrective measurement actions (Choose two) 

A. Use encrypted protocols, like those found in the OpenSSH suite. 

B. Implement FAT32 filesystem for faster indexing and improved performance. 

C. Configure the appropriate spoof rules on gateways (internal and external). 

D. Monitor for CRP caches, by using IDS products. 

Answer: AC

Explanation: First you should encrypt the data passed between the parties; in particular the session key. This technique is widely relied-upon by web-based banks and other e-commerce services, because it completely prevents sniffing-style attacks. However, it could still be possible to perform some other kind of session hijack. By configuring the appropriate spoof rules you prevent the attacker from using the same IP address as the victim as thus you can implement secondary check to see that the IP does not change in the middle of the session. 


Q399. In this attack, a victim receives an e-mail claiming from PayPal stating that their account has been disabled and confirmation is required before activation. The attackers then scam to collect not one but two credit card numbers, ATM PIN number and other personal details. 

Ignorant users usually fall prey to this scam. Which of the following statement is incorrect related to this attack? 

A. Do not reply to email messages or popup ads asking for personal or financial information 

B. Do not trust telephone numbers in e-mails or popup ads 

C. Review credit card and bank account statements regularly 

D. Antivirus, anti-spyware, and firewall software can very easily detect these type of attacks 

E. Do not send credit card numbers, and personal or financial information via e-mail 

Answer: A


Q400. What is the correct command to run Netcat on a server using port 56 that spawns command shell when connected? 

A. nc -port 56 -s cmd.exe 

B. nc -p 56 -p -e shell.exe 

C. nc -r 56 -c cmd.exe 

D. nc -L 56 -t -e cmd.exe 

Answer: D


To know more about the 312-50, click here.

Tagged as : EC-Council 312-50 Dumps, Download 312-50 pdf, 312-50 VCE, 312-50 pass4sure, examcollection 312-50