Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > EC-COUNCIL > EC-COUNCIL Certifications > 312-50 > 312-50 Online Practice Questions and Answers

312-50 Online Practice Questions and Answers

Questions 4

What is a primary advantage a hacker gains by using encryption or programs such as Loki?

A. It allows an easy way to gain administrator rights

B. It is effective against Windows computers

C. It slows down the effective response of an IDS

D. IDS systems are unable to decrypt it

E. Traffic will not be modified in transit

Buy Now

Correct Answer: D

Because the traffic is encrypted, an IDS cannot understand it or evaluate the payload.

Questions 5

While probing an organization you discover that they have a wireless network. From your attempts to connect to the WLAN you determine that they have deployed MAC filtering by using ACL on the access points. What would be the easiest way to circumvent and communicate on the WLAN?

A. Attempt to crack the WEP key using Airsnort.

B. Attempt to brute force the access point and update or delete the MAC ACL.

C. Steel a client computer and use it to access the wireless network.

D. Sniff traffic if the WLAN and spoof your MAC address to one that you captured.

Buy Now

Correct Answer: D

The easiest way to gain access to the WLAN would be to spoof your MAC address to one that already exists on the network.

Questions 6

Paul has just finished setting up his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption and enabling MAC filtering on hi wireless router. Paul notices when he uses his wireless connection, the speed is sometimes 54 Mbps and sometimes it is only 24mbps or less. Paul connects to his wireless router's management utility and notices that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router's logs and notices that the unfamiliar machine has the same MAC address as his laptop.

What is Paul seeing here?

A. MAC Spoofing

B. Macof

C. ARP Spoofing

D. DNS Spoofing

Buy Now

Correct Answer: A

You can fool MAC filtering by spoofing your MAC address and pretending to have some other computers MAC address.

Questions 7

Which of the following is the best way an attacker can passively learn about technologies used in an organization?

A. By sending web bugs to key personnel

B. By webcrawling the organization web site

C. By searching regional newspapers and job databases for skill sets technology hires need to possess in the organization

D. By performing a port scan on the organization's web site

Buy Now

Correct Answer: C

Note: Sending web bugs, webcrawling their site and port scanning are considered "active" attacks, the question asks "passive"

Questions 8

A Buffer Overflow attack involves:

A. Using a trojan program to direct data traffic to the target host's memory stack

B. Flooding the target network buffers with data traffic to reduce the bandwidth available to legitimate users

C. Using a dictionary to crack password buffers by guessing user names and passwords

D. Poorly written software that allows an attacker to execute arbitrary code on a target system

Buy Now

Correct Answer: D

B is a denial of service. By flooding the data buffer in an application with trash you could get access to write in the code segment in the application and that way insert your own code.

Questions 9

Erik notices a big increase in UDP packets sent to port 1026 and 1027 occasionally. He enters the following at the command prompt.

$ nc -l -p 1026 -u -v

In response, he sees the following message.

cell(?(c)????STOPALERT77STOP! WINDOWS REQUIRES IMMEDIATE ATTENTION.

Windows has found 47 Critical Errors.

To fix the errors please do the following:

1.

Download Registry Repair from: www.reg-patch.com

2.

Install Registry Repair

3.

Run Registry Repair

4.

Reboot your computer

FAILURE TO ACT NOW MAY LEAD TO DATA LOSS AND CORRUPTION!

What would you infer from this alert?

A. The machine is redirecting traffic to www.reg-patch.com using adware

B. It is a genuine fault of windows registry and the registry needs to be backed up

C. An attacker has compromised the machine and backdoored ports 1026 and 1027

D. It is a messenger spam. Windows creates a listener on one of the low dynamic ports from 1026 to 1029 and the message usually promotes malware disguised as legitimate utilities

Buy Now

Correct Answer: D

The "net send" Messenger service can be used by unauthorized users of your computer, without gaining any kind of privileged access, to cause a pop-up window to appear on your computer. Lately, this feature has been used by unsolicited commercial advertisers to inform many campus users about a "university diploma service"...

Questions 10

You are the security administrator for a large online auction company based out of Los Angeles. After getting your ENSA CERTIFICATION last year, you have steadily been fortifying your network's security including training OS hardening and network security. One of the last things you just changed for security reasons was to modify all the built-in administrator accounts on the local computers of PCs and in Active Directory. After through testing you found and no services or programs were affected by the name changes.

Your company undergoes an outside security audit by a consulting company and they said that even through all the administrator account names were changed, the accounts could still be used by a clever hacker to gain unauthorized access. You argue with the auditors and say that is not possible, so they use a tool and show you how easy it is to utilize the administrator account even though its name was changed.

What tool did the auditors use?

A. sid2user

B. User2sid

C. GetAcct

D. Fingerprint

Buy Now

Correct Answer: A

User2sid.exe can retrieve a SID from the SAM (Security Accounts Manager) from the local or a remote machine Sid2user.exe can then be used to retrieve the names of all the user accounts and more.

Questions 11

War dialing is a very old attack and depicted in movies that were made years ago. Why would a modem security tester consider using such an old technique?

A. It is cool, and if it works in the movies it must work in real life.

B. It allows circumvention of protection mechanisms by being on the internal network.

C. It allows circumvention of the company PBX.

D. A good security tester would not use such a derelict technique.

Buy Now

Correct Answer: B

If you are lucky and find a modem that answers and is connected to the target network, it usually is less protected (as only employees are supposed to know of its existence) and once connected you don't need to take evasive actions towards any firewalls or IDS.

Questions 12

You are footprinting an organization to gather competitive intelligence. You visit the company's website for contact information and telephone numbers but do not find it listed there. You know that they had the entire staff directory listed on their website 12 months ago but not it is not there.

How would it be possible for you to retrieve information from the website that is outdated?

A. Visit google's search engine and view the cached copy.

B. Visit Archive.org web site to retrieve the Internet archive of the company's website.

C. Crawl the entire website and store them into your computer.

D. Visit the company's partners and customers website for this information.

Buy Now

Correct Answer: B

Archive.org mirrors websites and categorizes them by date and month depending on the crawl time. Archive.org dates back to 1996, Google is incorrect because the cache is only as recent as the latest crawl, the cache is over-written on each subsequent crawl. Download the website is incorrect because that's the same as what you see online. Visiting customer partners websites is just bogus. The answer is then Firmly, C, archive.org

Questions 13

NSLookup is a good tool to use to gain additional information about a target network. What does the following command accomplish? nslookup

> server

> set type =any

> ls -d

A. Enables DNS spoofing

B. Loads bogus entries into the DNS table

C. Verifies zone security

D. Performs a zone transfer

E. Resets the DNS cache

Buy Now

Correct Answer: D

If DNS has not been properly secured, the command sequence displayed above will perform a zone transfer.

Exam Code: 312-50
Exam Name: Certified Ethical Hacker
Last Update: Jun 10, 2025
Questions: 614

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.