★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 312-50 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/312-50-dumps.html


It is more faster and easier to pass the EC-Council 312-50 exam by using High quality EC-Council Ethical Hacking and Countermeasures (CEHv6) questuins and answers. Immediate access to the Up to date 312-50 Exam and find the same core area 312-50 questions with professionally verified answers, then PASS your exam with a high score now.

2021 Nov ceh exam 312-50 pdf:

Q411. Study the following exploit code taken from a Linux machine and answer the questions below: 

echo “ingreslock stream tcp nowait root /bin/sh sh –I" > /tmp/x; 

/usr/sbin/inetd –s /tmp/x; 

sleep 10; 

/bin/ rm –f /tmp/x AAAA…AAA 

In the above exploit code, the command “/bin/sh sh –I" is given. 

What is the purpose, and why is ‘sh’ shown twice? 

A. The command /bin/sh sh –i appearing in the exploit code is actually part of an inetd configuration file. 

B. The length of such a buffer overflow exploit makes it prohibitive for user to enter manually. The second ‘sh’ automates this function. 

C. It checks for the presence of a codeword (setting the environment variable) among the environment variables. 

D. It is a giveaway by the attacker that he is a script kiddy. 

Answer: A

Explanation: What's going on in the above question is the attacker is trying to write to the unix filed /tm/x (his inetd.conf replacement config) -- he is attempting to add a service called ingresslock (which doesnt exist), which is "apparently" suppose to spawn a shell the given port specified by /etc/services for the service "ingresslock", ingresslock is a non-existant service, and if an attempt were made to respawn inetd, the service would error out on that line. (he would have to add the service to /etc/services to suppress the error). Now the question is asking about /bin/sh sh -i which produces an error that should read "sh: /bin/sh: cannot execute binary file", the -i option places the shell in interactive mode and cannot be used to respawn itself. 


Q412. If you send a SYN to an open port, what is the correct response?(Choose all correct answers. 

A. SYN 

B. ACK 

C. FIN 

D. PSH 

Answer: AB

Explanation: The proper response is a SYN / ACK. This technique is also known as half-open scanning. 


Q413. An attacker finds a web page for a target organization that supplies contact information for the company. Using available details to make the message seem authentic, the attacker drafts e-mail to an employee on the contact page that appears to come from an individual who might reasonably request confidential information, such as a network administrator. 

The email asks the employee to log into a bogus page that requests the employee's user name and password or click on a link that will download spyware or other malicious programming. 

Google's Gmail was hacked using this technique and attackers stole source code and sensitive data from Google servers. This is highly sophisticated attack using zero-day exploit vectors, social engineering and malware websites that focused on targeted individuals working for the company. 

What is this deadly attack called? 

A. Spear phishing attack 

B. Trojan server attack 

C. Javelin attack 

D. Social networking attack 

Answer: A


Q414. Which of the following tools are used for footprinting?(Choose four. 

A. Sam Spade 

B. NSLookup 

C. Traceroute 

D. Neotrace 

E. Cheops 

Answer: ABCD 

Explanation: All of the tools listed are used for footprinting except Cheops. 


Q415. What does the following command in "Ettercap" do? 

ettercap –NCLzs –quiet 

A. This command will provide you the entire list of hosts in the LAN 

B. This command will check if someone is poisoning you and will report its IP 

C. This command will detach ettercap from console and log all the sniffed passwords to a file 

D. This command broadcasts ping to scan the LAN instead of ARP request all the subset IPs 

Answer: C

Explanation: -L specifies that logging will be done to a binary file and –s tells us it is running in script mode. 


Improved ceh 312-50 dumps:

Q416. This TCP flag instructs the sending system to transmit all buffered data immediately. 

A. SYN 

B. RST 

C. PSH 

D. URG 

E. FIN 

Answer: C


Q417. Bret is a web application administrator and has just read that there are a number of surprisingly common web application vulnerabilities that can be exploited by unsophisticated attackers with easily available tools on the Internet. 

He has also read that when an organization deploys a web application, they invite the world to send HTTP requests. Attacks buried in these requests sail past firewalls, filters, platform hardening, SSL, and IDS without notice because they are inside legal HTTP requests. Bret is determined to weed out any vulnerabilities. What are some common vulnerabilities in web applications that he should be concerned about? 

A. Non-validated parameters, broken access control, broken account and session management, cross-side scripting and buffer overflows are just a few common vulnerabilities 

B. No IDS configured, anonymous user account set as default, missing latest security patch, no firewall filters set and visible clear text passwords are just a few common vulnerabilities 

C. Visible clear text passwords, anonymous user account set as default, missing latest security patch, no firewall filters set and no SSL configured are just a few common vulnerabilities 

D. No SSL configured, anonymous user account set as default, missing latest security patch, no firewall filters set and an inattentive system administrator are just a few common vulnerabilities 

Answer: A


Q418. Which definition among those given below best describes a covert channel? 

A. A server program using a port that is not well known. 

B. Making use of a protocol in a way it is not intended to be used. 

C. It is the multiplexing taking place on a communication link. 

D. It is one of the weak channels used by WEP which makes it insecure. 

Answer:

Explanation: A covert channel is described as: "any communication channel that can be exploited by a process to transfer information in a manner that violates the systems security policy." 

Essentially, it is a method of communication that is not part of an actual computer system design, but can be used to transfer information to users or system processes that normally would not be allowed access to the information. 


Q419. Bob is a Junior Administrator at ABC Company. He is installing the RedHat Enterprise Linux on his machine. At installation time, he removed the “Use MD5” options. What will be the hashing standard? 

A. MD2 

B. DES 

C. 3DES 

D. RSA 

Answer: B

Explanation: crypt() will return an encrypted string using the standard Unix DES-based encryption algorithm or alternative algorithms that may be available on the system. By removing the “Use MD5” option Bob forces crypt() to revert to DES encryption. 


Q420. Access control is often implemented through the use of MAC address filtering on wireless Access Points. Why is this considered to be a very limited security measure? 

A. Vendors MAC address assignment is published on the Internet. 

B. The MAC address is not a real random number. 

C. The MAC address is broadcasted and can be captured by a sniffer. 

D. The MAC address is used properly only on Macintosh computers. 

Answer: C