Proper study guides for Renew EC-Council Ethical Hacking and Countermeasures (CEHv6) certified begins with EC-Council 312-50 preparation products which designed to deliver the 100% Correct 312-50 questions by making you pass the 312-50 test at your first time. Try the free 312-50 demo right now.

Q311. Web servers often contain directories that do not need to be indexed. You create a text file with search engine indexing restrictions and place it on the root directory of the Web Server. 

User-agent: * Disallow: /images/ Disallow: /banners/ Disallow: /Forms/ Disallow: /Dictionary/ Disallow: /_borders/ Disallow: /_fpclass/ Disallow: /_overlay/ Disallow: /_private/ Disallow: /_themes/ What is the name of this file? 

A. robots.txt 

B. search.txt 

C. blocklist.txt 

D. spf.txt 

Answer: A


Q312. Jane has just accessed her preferred e-commerce web site and she has seen an item she would like to buy. Jane considers the price a bit too steep; she looks at the page source code and decides to save the page locally to modify some of the page variables. In the context of web application security, what do you think Jane has changed? 

A. An integer variable 

B. A 'hidden' price value 

C. A 'hidden' form field value 

D. A page cannot be changed locally; it can only be served by a web server 

Answer: C

Explanation: Changing hidden form values is possible when a web site is poorly built and is trusting the visitors computer to submit vital data, like the price of a product, to the database. 


Q313. Fingerprinting an Operating System helps a cracker because: 

A. It defines exactly what software you have installed 

B. It opens a security-delayed window based on the port being scanned 

C. It doesn't depend on the patches that have been applied to fix existing security holes 

D. It informs the cracker of which vulnerabilities he may be able to exploit on your system 

Answer: D

Explanation: When a cracker knows what OS and Services you use he also knows which exploits might work on your system. If he would have to try all possible exploits for all possible Operating Systems and Services it would take too long time and the possibility of being detected increases. 


Q314. You run nmap port Scan on 10.0.0.5 and attempt to gain banner/server information from services running on ports 21, 110 and 123. 

Here is the output of your scan results: 

Which of the following nmap command did you run? 

A. nmap -A -sV -p21,110,123 10.0.0.5 

B. nmap -F -sV -p21,110,123 10.0.0.5 

C. nmap -O -sV -p21,110,123 10.0.0.5 

D. nmap -T -sV -p21,110,123 10.0.0.5 

Answer: C


Q315. Windows LAN Manager (LM) hashes are known to be weak. Which of the following are known weaknesses of LM? (Choose three) 

A. Converts passwords to uppercase. 

B. Hashes are sent in clear text over the network. 

C. Makes use of only 32 bit encryption. 

D. Effective length is 7 characters. 

Answer: ABD

Explanation: The LM hash is computed as follows.1. The user’s password as an OEM string is converted to uppercase. 2. This password is either null-padded or truncated to 14 bytes. 3. The “fixed-length” password is split into two 7-byte halves. 4. These values are used to create two DES keys, one from each 7-byte half. 5. Each of these keys is used to DES-encrypt the constant ASCII string “KGS!@#$%”, resulting in two 8-byte ciphertext values. 6. These two ciphertext values are concatenated to form a 16-byte value, which is the LM hash. The hashes them self are sent in clear text over the network instead of sending the password in clear text. 


Q316. While reviewing the results of a scan run against a target network you come across the following: 

What was used to obtain this output? 

A. An SNMP Walk 

B. Hping2 diagnosis 

C. A Bo2K System query 

D. Nmap protocol/port scan 

Answer: A

Explanation: The snmpwalk command is designed to perform a sequence of chained GETNEXT requests automatically, rather than having to issue the necessary snmpgetnext requests by hand. The command takes a single OID, and will display a list of all the results which lie within the subtree rooted on this OID. 


Q317. More sophisticated IDSs look for common shellcode signatures. But even these systems can be bypassed, by using polymorphic shellcode. This is a technique common among virus writers - it basically hides the true nature of the shellcode in different disguises. 

How does a polymorphic shellcode work? 

A. They convert the shellcode into Unicode, using loader to convert back to machine code then executing them 

B. They compress shellcode into normal instructions, uncompress the shellcode using loader code and then executing the shellcode 

C. They reverse the working instructions into opposite order by masking the IDS signatures 

D. They encrypt the shellcode by XORing values over the shellcode, using loader code to decrypt the shellcode, and then executing the decrypted shellcode 

Answer: A

Explanation: In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode" because it typically starts a command shell from which the attacker can control the compromised machine. Shellcode is commonly written in machine code, but any piece of code that performs a similar task can be called shellcode 


Q318. Blane is a security analyst for a law firm. One of the lawyers needs to send out an email to a client but he wants to know if the email is forwarded on to any other recipients. The client is explicitly asked not to re-send the email since that would be a violation of the lawyer's and client's agreement for this particular case. What can Blane use to accomplish this? 

A. He can use a split-DNS service to ensure the email is not forwarded on. 

B. A service such as HTTrack would accomplish this. 

C. Blane could use MetaGoofil tracking tool. 

D. Blane can use a service such as ReadNotify tracking tool. 

Answer: D


Q319. Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products? 

A. Covert keylogger 

B. Stealth keylogger 

C. Software keylogger 

D. Hardware keylogger 

Answer: D

Explanation: As the hardware keylogger never interacts with the Operating System it is undetectable by anti-virus or anti-spyware products. 


Q320. Bob reads an article about how insecure wireless networks can be. He gets approval from his management to implement a policy of not allowing any wireless devices on the network. What other steps does Bob have to take in order to successfully implement this? (Select 2 answer.) 

A. Train users in the new policy. 

B. Disable all wireless protocols at the firewall. 

C. Disable SNMP on the network so that wireless devices cannot be configured. 

D. Continuously survey the area for wireless devices. 

Answer: AD

Explanation: If someone installs a access point and connect it to the network there is no way to find it unless you are constantly surveying the area for wireless devices. SNMP and firewalls can not prevent the installation of wireless devices on the corporate network.