★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 312-50 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/312-50-dumps.html


For just a limited time merely, opt for the total couple of EC-Council 312-50 assessment analyze resources, as well as conserve 10% on the obtain. Reinvest those funds inside you win dance, as soon as you end up being the after that EC-Council recognition from moving past your current 312-50 assessment. Even though you be aware of different 312-50 analyze resources, merely Pass4sure provides you with a good 312-50 analyze resources that could enable you to rapidly grasp the working experience you must with success introduction your work while in the IT sector.

2021 Oct ceh 312-50 exam price:

Q181. Perimeter testing means determining exactly what your firewall blocks and what it allows. To conduct a good test, you can spoof source IP addresses and source ports. Which of the following command results in packets that will appear to originate from the system at 10.8.8.8? Such a packet is useful for determining whether the firewall is allowing random packets in or out of your network. 

A. hping3 -T 10.8.8.8 -S netbios -c 2 -p 80 

B. hping3 -Y 10.8.8.8 -S windows -c 2 -p 80 

C. hping3 -O 10.8.8.8 -S server -c 2 -p 80 

D. hping3 -a 10.8.8.8 -S springfield -c 2 -p 80 

Answer: D


Q182. Which of the following encryption is not based on Block Cipher? 

A. DES 

B. Blowfish 

C. AES 

D. RC4 

Answer: D

Explanation: RC4 (also known as ARC4 or ARCFOUR) is the most widely-used software stream cipher and is used in popular protocols such as Secure Sockets Layer (SSL) (to protect Internet traffic) and WEP (to secure wireless networks). 


Topic 22, Penetration Testing Methodologies 

556. Joel and her team have been going through tons of garbage, recycled paper, and other rubbish in order to find some information about the target they are attempting to penetrate. 

What would you call this kind of activity? 

A. CI Gathering 

B. Scanning 

C. Dumpster Diving 

D. Garbage Scooping 

Answer: C


Q183. What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall if your network is comprised of Windows NT, 2000, and XP?(Choose all that apply. 

A. 110 

B. 135 

C. 139 

D. 161 

E. 445 

F. 1024 

Answer: BCE 

Explanation: NetBIOS traffic can quickly be used to enumerate and attack Windows computers. 

Ports 135, 139, and 445 should be blocked. 


Q184. Which of the following LM hashes represent a password of less than 8 characters? (Select 2) 

A. BA810DBA98995F1817306D272A9441BB 

B. 44EFCE164AB921CQAAD3B435B51404EE 

C. 0182BD0BD4444BF836077A718CCDF409 

D. CEC52EB9C8E3455DC2265B23734E0DAC 

E. B757BF5C0D87772FAAD3B435B51404EE 

F. E52CAC67419A9A224A3B108F3FA6CB6D 

Answer: BE

Explanation: Notice the last 8 characters are the same 


Q185. E-mail scams and mail fraud are regulated by which of the following? 

A. 18 U.S.C. par. 1030 Fraud and Related activity in connection with Computers 

B. 18 U.S.C. par. 1029 Fraud and Related activity in connection with Access Devices 

C. 18 U.S.C. par. 1362 Communication Lines, Stations, or Systems 

D. 18 U.S.C. par. 2510 Wire and Electronic Communications Interception and Interception of Oral Communication 

Answer: A

Explanation: http://www.law.cornell.edu/uscode/html/uscode18/usc_sec_18_00001030----000-.html 


312-50 exam cost

Up to the immediate present ceh exam 312-50 pdf:

Q186. What is the most common vehicle for social engineering attacks? 

A. Phone 

B. Email 

C. In person 

D. P2P Networks 

Answer: A

Explanation: Pretexting is the act of creating and using an invented scenario (the pretext) to persuade a target to release information or perform an action and is usually done over the telephone. 


Q187. Leesa is the senior security analyst for a publicly traded company. The IT department recently rolled out an intranet for company use only with information ranging from training, to holiday schedules, to human resources data. Leesa wants to make sure the site is not accessible from outside and she also wants to ensure the site is Sarbanes-Oxley (SOX) compliant. Leesa goes to a public library as she wants to do some Google searching to verify whether the company's intranet is accessible from outside and has been indexed by Google. Leesa wants to search for a website title of "intranet" with part of the URL containing the word "intranet" and the words "human resources" somewhere in the webpage. 

What Google search will accomplish this? 

A. related:intranet allinurl:intranet:"human resources" 

B. cache:"human resources" inurl:intranet(SharePoint) 

C. intitle:intranet inurl:intranet+intext:"human resources" 

D. site:"human resources"+intext:intranet intitle:intranet 

Answer: C


Q188. Which of the following is NOT true of cryptography? 

A. Science of protecting information by encoding it into an unreadable format 

B. Method of storing and transmitting data in a form that only those it is intended for can read and process 

C. Most (if not all) algorithms can be broken by both technical and non-technical means 

D. An effective way of protecting sensitive information in storage but not in transit 

Answer: D 

Explanation: Cryptography will protect data in both storage and in transit. 


Q189. Study the log below and identify the scan type. 

tcpdump -vv host 192.168.1.10 

17:34:45.802163 eth0 < 192.168.1.1 > victim: ip-proto-117 0 (ttl 48, id 36166) 

17:34:45.802216 eth0 < 192.168.1.1 > victim: ip-proto-25 0 (ttl 48, id 33796) 

17:34:45.802266 eth0 < 192.168.1.1 > victim: ip-proto-162 0 (ttl 48, id 47066) 

17:34:46.111982 eth0 < 192.168.1.1 > victim: ip-proto-74 0 (ttl 48, id 35585) 

17:34:46.112039 eth0 < 192.168.1.1 > victim: ip-proto-117 0 (ttl 48, id 32834) 

17:34:46.112092 eth0 < 192.168.1.1 > victim: ip-proto-25 0 (ttl 48, id 26292) 

17:34:46.112143 eth0 < 192.168.1.1 > victim: ip-proto-162 0 (ttl 48, id 51058) 

tcpdump -vv -x host 192.168.1.10 

17:35:06.731739 eth0 < 192.168.1.10 > victim: ip-proto-130 0 (ttl 59, id 42060) 4500 0014 a44c 0000 3b82 57b8 c0a8 010a c0a8 0109 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 

A. nmap -sR 192.168.1.10 

B. nmap -sS 192.168.1.10 

C. nmap -sV 192.168.1.10 

D. nmap -sO -T 192.168.1.10 

Answer: D


Q190. What command would you type to OS fingerprint a server using the command line? 



A. Option A 

B. Option B 

C. Option C 

D. Option D 

Answer: C