Simulation of 312-50 exams materials and rapidshare for EC-Council certification for customers, Real Success Guaranteed with Updated 312-50 pdf dumps vce Materials. 100% PASS Ethical Hacking and Countermeasures (CEHv6) exam Today!

2021 Mar 312-50 free practice test

Q91. You visit a website to retrieve the listing of a company's staff members. But you can not find it on the website. You know the listing was certainly present one year before. How can you retrieve information from the outdated website? 

A. Through Google searching cached files 

B. Through 

C. Download the website and crawl it 

D. Visit customers' and prtners' websites 

Answer: B

Explanation: mirrors websites and categorizes them by date and month depending on the crawl time. dates back to 1996, Google is incorrect because the cache is only as recent as the latest crawl, the cache is over-written on each subsequent crawl. Download the website is incorrect because that's the same as what you see online. Visiting customer partners websites is just bogus. The answer is then Firmly, C, 

Q92. The following excerpt is taken from a honeyput log. The log captures activities across three days. There are several intrusion attempts; however, a few are successful. Study the log given below and answer the following question: 

(Note: The objective of this questions is to test whether the student has learnt about passive OS fingerprinting (which should tell them the OS from log captures): can they tell a SQL injection attack signature; can they infer if a user ID has been created by an attacker and whether they can read plain source – destination entries from log entries.) 

What can you infer from the above log? 

A. The system is a windows system which is being scanned unsuccessfully. 

B. The system is a web application server compromised through SQL injection. 

C. The system has been compromised and backdoored by the attacker. 

D. The actual IP of the successful attacker is 

Answer: A

Q93. To scan a host downstream from a security gateway, Firewalking: 

A. Sends a UDP-based packet that it knows will be blocked by the firewall to determine how specifically the firewall responds to such packets 

B. Uses the TTL function to send packets with a TTL value set to expire one hop past the identified security gateway 

C. Sends an ICMP ''administratively prohibited'' packet to determine if the gateway will drop the packet without comment. 

D. Assesses the security rules that relate to the target system before it sends packets to any hops on the route to the gateway 

Answer: B

Explanation: Firewalking uses a traceroute-like IP packet analysis to determine whether or not a particular packet can pass from the attacker’s host to a destination host through a packet-filtering device. This technique can be used to map ‘open’ or ‘pass through’ ports on a gateway. More over, it can determine whether packets with various control information can pass through a given gateway. 

Q94. The Slammer Worm exploits a stack-based overflow that occurs in a DLL implementing the Resolution Service. 

Which of the following Database Server was targeted by the slammer worm? 

A. Oracle 



D. Sybase 

E. DB2 

Answer: B

Explanation: W32.Slammer is a memory resident worm that propagates via UDP Port 1434 and exploits a vulnerability in SQL Server 2000 systems and systems with MSDE 2000 that have not applied the patch released by Microsoft Security Bulletin MS02-039. 

Q95. You want to use netcat to generate huge amount of useless network data continuously for various performance testing between 2 hosts. 

Which of the following commands accomplish this? 

A. Machine A #yes AAAAAAAAAAAAAAAAAAAAAA | nc –v –v –l –p 2222 > /dev/null Machine B #yes BBBBBBBBBBBBBBBBBBBBBB | nc machinea 2222 > /dev/null 

B. Machine A cat somefile | nc –v –v –l –p 2222 Machine B cat somefile | nc othermachine 2222 C. Machine A nc –l –p 1234 | uncompress –c | tar xvfp Machine B tar cfp - /some/dir | compress –c | nc –w 3 machinea 1234 

D. Machine A while true : do nc –v –l –s –p 6000 machineb 2 Machine B while true ; do nc –v –l –s –p 6000 machinea 2 done 

Answer: A

Explanation: Machine A is setting up a listener on port 2222 using the nc command and then having the letter A sent an infinite amount of times, when yes is used to send data yes NEVER stops until it recieves a break signal from the terminal (Control+C), on the client end (machine B), nc is being used as a client to connect to machine A, sending the letter B and infinite amount of times, while both clients have established a TCP connection each client is infinitely sending data to each other, this process will run FOREVER until it has been stopped by an administrator or the attacker. 

Improve 312-50 exam topics:

Q96. 1 ( 0.724 ms 3.285 ms 0.613 ms 2 ( 12.169 ms 14.958 ms 13.416 ms 3 ( 13.948 ms 

( 16.743 ms 16.207 ms 4 ( 17.324 ms 13.933 ms 

20.938 ms 

5 ( 12.439 ms 220.166 ms 204.170 ms 6 ( 16.177 ms 25.943 ms 14.104 ms 7 ( 14.227 ms 17.553 ms 15.415 ms 8 ( 17.063 ms 20.960 ms 

19.512 ms 9 ( 20.334 ms 19.440 ms 

17.938 ms 10 ( 27.526 ms 18.317 ms 21.202 ms 11 ( 21.411 ms 

19.133 ms 18.830 ms 12 ( 21.203 ms 22.670 ms 

20.111 ms 13 ( 30.929 ms 24.858 ms 

23.108 ms 14 ( 37.894 ms 33.244 ms 

33.910 ms 15 ( 51.165 ms 49.935 ms 

49.466 ms 16 ( 50.937 ms 49.005 ms 

51.055 ms 17 117.ATM6-0.GW5.MIA1.ALTER.NET ( 51.897 ms 50.280 ms 

53.647 ms 18 ( 51.921 ms 51.571 ms 

56.855 ms 19 <> ( 52.191 ms 

52.571 ms 56.855 ms 20 <> ( 53.561 ms 

54.121 ms 58.333 ms 

You perform the above traceroute and notice that hops 19 and 20 both show the same IP address. This probably indicates what? 

A. A host based IDS 

B. A Honeypot 

C. A stateful inspection firewall 

D. An application proxying firewall 

Answer: C

Q97. The terrorist organizations are increasingly blocking all traffic from North America or from Internet Protocol addresses that point to users who rely on the English Language. 

Hackers sometimes set a number of criteria for accessing their website. This information is shared among the co-hackers. For example if you are using a machine with the Linux Operating System and the Netscape browser then you will have access to their website in a convert way. When federal investigators using PCs running windows and using Internet Explorer visited the hacker’s shared site, the hacker’s system immediately mounted a distributed denial-of-service attack against the federal system. 

Companies today are engaging in tracking competitor’s through reverse IP address lookup sites like, which provide an IP address’s domain. When the competitor visits the companies website they are directed to a products page without discount and prices are marked higher for their product. When normal users visit the website they are directed to a page with full-blown product details along with attractive discounts. This is based on IP-based blocking, where certain addresses are barred from accessing a site. 

What is this masking technique called? 

A. Website Cloaking 

B. Website Filtering 

C. IP Access Blockade 

D. Mirrored WebSite 

Answer: A

Explanation: Website Cloaking travels under a variety of alias including Stealth, Stealth scripts, IP delivery, Food Script, and Phantom page technology. It’s hot- due to its ability to manipulate those elusive top-ranking results from spider search engines. 

Q98. Justine is the systems administrator for her company, an international shipping company with offices all over the world. Recent US regulations have forced the company to implement stronger and more secure means of communication. Justine and other administrators have been put in charge of securing the company's digital communication lines. After implementing email encryption, Justine now needs to implement robust digital signatures to ensure data authenticity and reliability. Justine has decided to implement digital signatures which are a variant of DSA and that operate on elliptical curve groups. These signatures are more efficient than DSA and are not vulnerable to a number field sieve attacks. 

What type of signature has Justine decided to implement? 

A. She has decided to implement ElGamal signatures since they offer more reliability than the typical DSA signatures 

B. Justine has decided to use ECDSA signatures since they are more efficient than DSA signatures 

C. Justine is now utilizing SHA-1 with RSA signatures to help ensure data reliability 

D. These types of signatures that Justine has decided to use are called RSA-PSS signatures 

Answer: B

Explanation: The Elliptic Curve Digital Signature Algorithm (ECDSA) is a variant of the Digital Signature Algorithm (DSA) which uses Elliptic curve cryptography. 

Q99. This is an authentication method in which is used to prove that a party knows a password without transmitting the password in any recoverable form over a network. This authentication is secure because the password is never transmitted over the network, even in hashed form; only a random number and an encrypted random number are sent. 

A. Realm Authentication 

B. SSL Authentication 

C. Basic Form Authentication 

D. Cryptographic Authentication 

E. Challenge/Response Authentication 

Answer: E

Explanation: Challenge-Response Authentication The secure Challenge-Response Authentication Mechanism (CRAM-MD5) avoids passing a cleartext password over the network when you access your email account, ensuring that your login details cannot be captured and used by anyone in transit. 

Q100. Susan has attached to her company’s network. She has managed to synchronize her boss’s sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory. What kind of attack is Susan carrying on? 

A. A sniffing attack 

B. A spoofing attack 

C. A man in the middle attack 

D. A denial of service attack 

Answer: C

Explanation: A man-in-the-middle attack (MITM) is an attack in which an attacker is able to read, insert and modify at will, messages between two parties without either party knowing that the link between them has been compromised.