★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 312-50 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/312-50-dumps.html


Cause all that matters here is passing the EC-Council 312-50 exam. Cause all that you need is a high score of 312-50 Ethical Hacking and Countermeasures (CEHv6) exam. The only one thing you need to do is downloading Ucertify 312-50 exam study guides now. We will not let you down with our money-back guarantee.

2021 Oct ceh 312-50 exam price:

Q381. What is the most common vehicle for social engineering attacks? 

A. Email 

B. Direct in person 

C. Local Area Networks 

D. Peer to Peer Networks 

Answer: B

Explanation: All social engineering techniques are based on flaws in human logic known as cognitive biases. 

Topic 10, Session Hijacking 

322. Bob is going to perform an active session hijack against company. He has acquired the target that allows session oriented connections (Telnet) and performs sequence prediction on the target operating system. He manages to find an active session due to the high level of traffic on the network. 

So, what is Bob most likely to do next? 

A. Take over the session. 

B. Reverse sequence prediction. 

C. Guess the sequence numbers. 

D. Take one of the parties’ offline. 

Answer: C


Q382. Which of the following is NOT a reason 802.11 WEP encryption is vulnerable? 

A. There is no mutual authentication between wireless clients and access points 

B. Automated tools like AirSnort are available to discover WEP keys 

C. The standard does not provide for centralized key management 

D. The 24 bit Initialization Vector (IV) field is too small 

Answer: C

Explanation: The lack of centralized key management in itself is not a reason that the WEP encryption is vulnerable, it is the people setting the user shared key that makes it unsecure. 


Q383. Shayla is an IT security consultant, specializing in social engineering and external penetration tests. Shayla has been hired on by Treks Avionics, a subcontractor for the Department of Defense. Shayla has been given authority to perform any and all tests necessary to audit the company's network security. 

No employees for the company, other than the IT director, know about Shayla's work she will be doing. Shayla's first step is to obtain a list of employees through company website contact pages. Then she befriends a female employee of the company through an online chat website. After meeting with the female employee numerous times, Shayla is able to gain her trust and they become friends. One day, Shayla steals the employee's access badge and uses it to gain unauthorized access to the Treks Avionics offices. 

What type of insider threat would Shayla be considered? 

A. She would be considered an Insider Affiliate 

B. Because she does not have any legal access herself, Shayla would be considered an Outside Affiliate 

C. Shayla is an Insider Associate since she has befriended an actual employee 

D. Since Shayla obtained access with a legitimate company badge; she would be considered a Pure Insider 

Answer: A


Q384. A zone file consists of which of the following Resource Records (RRs)? 

A. DNS, NS, AXFR, and MX records 

B. DNS, NS, PTR, and MX records 

C. SOA, NS, AXFR, and MX records 

D. SOA, NS, A, and MX records 

Answer:

Explanation: The zone file typically contains the following records: 

SOA – Start Of Authority NS – Name Server record MX – Mail eXchange record A – Address record 


Q385. A denial of Service (DoS) attack works on the following principle: 

A. MS-DOS and PC-DOS operating system utilize a weaknesses that can be compromised and permit them to launch an attack easily. 

B. All CLIENT systems have TCP/IP stack implementation weakness that can be compromised and permit them to lunch an attack easily. 

C. Overloaded buffer systems can easily address error conditions and respond appropriately. 

D. Host systems cannot respond to real traffic, if they have an overwhelming number of incomplete connections (SYN/RCVD State). 

E. A server stops accepting connections from certain networks one those network become flooded. 

Answer: D

Explanation: Denial-of-service (often abbreviated as DoS) is a class of attacks in which an attacker attempts to prevent legitimate users from accessing an Internet service, such as a web site. This can be done by exercising a software bug that causes the software running the service to fail (such as the “Ping of Death” attack against Windows NT systems), sending enough data to consume all available network bandwidth (as in the May, 2001 attacks against Gibson Research), or sending data in such a way as to consume a particular resource needed by the service. 


Replace ceh official certified ethical hacker review guide exam 312-50 pdf:

Q386. How does a denial-of-service attack work? 

A. A hacker tries to decipher a password by using a system, which subsequently crashes the network 

B. A hacker attempts to imitate a legitimate user by confusing a computer or even another person 

C. A hacker prevents a legitimate user (or group of users) from accessing a service 

D. A hacker uses every character, word, or letter he or she can think of to defeat authentication 

Answer: C

Explanation: In computer security, a denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended users. Typically the targets are high-profile web servers, and the attack attempts to make the hosted web pages unavailable on the Internet. It is a computer crime that violates the Internet proper use policy as indicated by the Internet Architecture Board (IAB). 


Q387. Bob wants to prevent attackers from sniffing his passwords on the wired network. Which of the following lists the best options? 

A. RSA, LSA, POP 

B. SSID, WEP, Kerberos 

C. SMB, SMTP, Smart card 

D. Kerberos, Smart card, Stanford SRP 

Answer: D

Explanation: Kerberos, Smart cards and Stanford SRP are techniques where the password never leaves the computer. 


Q388. Pandora is used to attack __________ network operating systems. 

A. Windows 

B. UNIX 

C. Linux 

D. Netware 

E. MAC OS 

Answer: D

Explanation: While there are not lots of tools available to attack Netware, Pandora is one that can be used. 


Q389. Bart is looking for a Windows NT/2000/XP command-line tool that can be used to assign, display, or modify ACL’s (access control lists) to files or folders and also one that can be used within batch files. 

Which of the following tools can be used for that purpose? (Choose the best answer) 

A. PERM.exe 

B. CACLS.exe 

C. CLACS.exe 

D. NTPERM.exe 

Answer:

Explanation: Cacls.exe is a Windows NT/2000/XP command-line tool you can use to assign, display, or modify ACLs (access control lists) to files or folders. Cacls is an interactive tool, and since it's a command-line utility, you can also use it in batch files. 


Q390. Bill has successfully executed a buffer overflow against a Windows IIS web server. He has been able to spawn an interactive shell and plans to deface the main web page. He first attempts to use the “Echo” command to simply overwrite index.html and remains unsuccessful. He then attempts to delete the page and achieves no progress. Finally, he tries to overwrite it with another page again in vain. 

What is the probable cause of Bill’s problem? 

A. The system is a honeypot. 

B. There is a problem with the shell and he needs to run the attack again. 

C. You cannot use a buffer overflow to deface a web page. 

D. The HTML file has permissions of ready only. 

Answer: D

Explanation: The question states that Bill had been able to spawn an interactive shell. By this statement we can tell that the buffer overflow and its corresponding code was enough to spawn a shell. Any shell should make it possible to change the webpage. So we either don’t have sufficient privilege to change the webpage (answer D) or it’s a honeypot (answer A). We think the preferred answer is D