High quality of 312-50 exam guide materials and preparation labs for EC-Council certification for examinee, Real Success Guaranteed with Updated 312-50 pdf dumps vce Materials. 100% PASS Ethical Hacking and Countermeasures (CEHv6) exam Today!

2021 Mar 312-50 actual test

Q101. John is using tokens for the purpose of strong authentication. He is not confident that his security is considerably strong. 

In the context of Session hijacking why would you consider this as a false sense of security? 

A. The token based security cannot be easily defeated. 

B. The connection can be taken over after authentication. 

C. A token is not considered strong authentication. 

D. Token security is not widely used in the industry. 

Answer: B

Explanation: A token will give you a more secure authentication, but the tokens will not help against attacks that are directed against you after you have been authenticated. 

Q102. What is the correct order of steps in CEH System Hacking Cycle? 

A. Option A 

B. Option B 

C. Option C 

D. Option D 

Answer: A

Q103. This kind of attack will let you assume a users identity at a dynamically generated web page or site: 

A. SQL Injection 

B. Cross Site Scripting 

C. Session Hijacking 

D. Zone Transfer 

Answer: B

Explanation: Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users. Examples of such code include HTML code and client-side scripts. An exploited cross-site scripting vulnerability can be used by attackers to bypass access controls such as the same origin policy. 

Q104. ____________ will let you assume a users identity at a dynamically generated web page or site. 

A. SQL attack 

B. Injection attack 

C. Cross site scripting 

D. The shell attack 

E. Winzapper 

Answer: C

Explanation: Cross site scripting is also referred to as XSS or CSS. You must know the user is online and you must scam that user into clicking on a link that you have sent in order for this hack attack to work. 

Q105. Exhibit: 

You are conducting pen-test against a company’s website using SQL Injection techniques. You enter “anuthing or 1=1-“ in the username filed of an authentication form. This is the output returned from the server. 

What is the next step you should do? 

A. Identify the user context of the web application by running_ 



USER_NAME() = ‘dbo’ 

B. Identify the database and table name by running: 

http://www.example.com/order/include_rsa.asp?pressReleaseID=5 AND ascii(lower(substring((SELECT TOP 1 name FROM sysobjects WHERE xtype=’U’),1))) > 109 

C. Format the C: drive and delete the database by running: http://www.example.com/order/include_rsa.asp?pressReleaseID=5 AND xp_cmdshell ‘format c: /q /yes ‘; drop database myDB; --

D. Reboot the web server by running: http://www.example.com/order/include_rsa.asp?pressReleaseID=5 AND xp_cmdshell ‘iisreset –reboot’; --

Answer: A

Updated 312-50 free question:

Q106. Joseph has just been hired on to a contractor company of the Department of Defense as their Senior Security Analyst. Joseph has been instructed on the company's strict security policies that have been implemented, and the policies that have yet to be put in place. Per the Department of Defense, all DoD users and the users of their contractors must use two-factor authentication to access their networks. Joseph has been delegated the task of researching and implementing the best two-factor authentication method for his company. Joseph's supervisor has told him that they would like to use some type of hardware device in tandem with a security or identifying pin number. Joseph's company has already researched using smart cards and all the resources needed to implement them, but found the smart cards to not be cost effective. What type of device should Joseph use for two-factor authentication? 

A. Biometric device 


C. Proximity cards 

D. Security token 

Answer: D

Q107. One of the most common and the best way of cracking RSA encryption is to being to derive the two prime numbers, which are used in the RSA PKI mathematical process. If the two numbers p and q are discovered through a _________________ process, then the private key can be derived. 

A. Factorization 

B. Prime Detection 

C. Hashing 

D. Brute-forcing 

Answer: A

Explanation: In April 1994, an international cooperative group of mathematicians and computer scientists solved a 17-year-old challenge problem, the factoring of a 129-digit number, called RSA-129, into two primes. That is, RSA-129 = 1143816257578888676692357799761466120102182 9672124236256256184293570693524573389783059 7123563958705058989075147599290026879543541 = 34905295108476509491478496199038 98133417764638493387843990820577 times 32769132993266709549961988190834 461413177642967992942539798288533. Se more at http://en.wikipedia.org/wiki/RSA_Factoring_Challenge 

Q108. If an attacker's computer sends an IPID of 24333 to a zombie (Idle Scanning) computer on a closed port, what will be the response? 

A. The zombie computer will respond with an IPID of 24334. 

B. The zombie computer will respond with an IPID of 24333. 

C. The zombie computer will not send a response. 

D. The zombie computer will respond with an IPID of 24335. 

Answer: C

Q109. Which of the following statements about a zone transfer correct?(Choose three. 

A. A zone transfer is accomplished with the DNS 

B. A zone transfer is accomplished with the nslookup service 

C. A zone transfer passes all zone information that a DNS server maintains 

D. A zone transfer passes all zone information that a nslookup server maintains 

E. A zone transfer can be prevented by blocking all inbound TCP port 53 connections 

F. Zone transfers cannot occur on the Internet 

Answer: ACE

Explanation: Securing DNS servers should be a priority of the organization. Hackers obtaining DNS information can discover a wealth of information about an organization. This information can be used to further exploit the network. 

Q110. What is the following command used for? 

net use targetipc$ "" /u:"" 

A. Grabbing the etc/passwd file 

B. Grabbing the SAM 

C. Connecting to a Linux computer through Samba. 

D. This command is used to connect as a null session 

E. Enumeration of Cisco routers 


Explanation: The null session is one of the most debilitating vulnerabilities faced by Windows. 

Null sessions can be established through port 135, 139, and 445.