It is impossible to pass EC-Council 312-50 exam without any help in the short term. Come to Examcollection soon and find the most advanced, correct and guaranteed EC-Council 312-50 practice questions. You will get a surprising result by our Up to the minute Ethical Hacking and Countermeasures (CEHv6) practice guides.

Q11. Within the context of Computer Security, which of the following statements best describe Social Engineering? 

A. Social Engineering is the act of publicly disclosing information. 

B. Social Engineering is the act of getting needed information from a person rather than breaking into a system. 

C. Social Engineering is the means put in place by human resource to perform time accounting. 

D. Social Engineering is a training program within sociology studies. 

Answer: B

Explanation: Social engineering is a collection of techniques used to manipulate people into performing actions or divulging confidential information. 


Q12. David is a security administrator working in Boston. David has been asked by the office's manager to block all POP3 traffic at the firewall because he believes employees are spending too much time reading personal email. How can David block POP3 at the firewall? 

A. David can block port 125 at the firewall. 

B. David can block all EHLO requests that originate from inside the office. 

C. David can stop POP3 traffic by blocking all HELO requests that originate from inside the office. 

D. David can block port 110 to block all POP3 traffic. 

Answer: D


Q13. fter studying the following log entries, what is the attacker ultimately trying to achieve as inferred from the log sequence? 

1. mkdir -p /etc/X11/applnk/Internet/.etc 

2. mkdir -p /etc/X11/applnk/Internet/.etcpasswd 

3. touch -acmr /etc/passwd /etc/X11/applnk/Internet/.etcpasswd 

4. touch -acmr /etc /etc/X11/applnk/Internet/.etc 

5. passwd nobody -d 

6. /usr/sbin/adduser dns -d/bin -u 0 -g 0 -s/bin/bash 

7. passwd dns -d 

8. touch -acmr /etc/X11/applnk/Internet/.etcpasswd /etc/passwd 

9. touch -acmr /etc/X11/applnk/Internet/.etc /etc 

A. Change password of user nobody 

B. Extract information from a local directory 

C. Change the files Modification Access Creation times 

D. Download rootkits and passwords into a new directory 

Answer: C


Q14. A common technique for luring e-mail users into opening virus-launching attachments is to send messages that would appear to be relevant or important to many of their potential recipients. One way of accomplishing this feat is to make the virus-carrying messages appear to come from some type of business entity retailing sites, UPS, FEDEX, CITIBANK or a major provider of a common service. 

Here is a fraudulent e-mail claiming to be from FedEx regarding a package that could not be delivered. This mail asks the receiver to open an attachment in order to obtain the FEDEX tracking number for picking up the package. The attachment contained in this type of e-mail activates a virus. 

Vendors send e-mails like this to their customers advising them not to open any files attached with the mail, as they do not include attachments. 

Fraudulent e-mail and legit e-mail that arrives in your inbox contain the fedex.com as the sender of the mail. 

How do you ensure if the e-mail is authentic and sent from fedex.com? 

A. Verify the digital signature attached with the mail, the fake mail will not have Digital ID at all 

B. Check the Sender ID against the National Spam Database (NSD) 

C. Fake mail will have spelling/grammatical errors 

D. Fake mail uses extensive images, animation and flash content 

Answer: A


Q15. Exhibit: 

What type of attack is shown in the above diagram? 

A. SSL Spoofing Attack 

B. Identity Stealing Attack 

C. Session Hijacking Attack 

D. Man-in-the-Middle (MiTM) Attack 

Answer: D

Explanation: A man-in-the-middle attack (MITM) is an attack in which an attacker is able to read, insert and modify at will, messages between two parties without either party knowing that the link between them has been compromised. 


Q16. How would you describe a simple yet very effective mechanism for sending and receiving unauthorized information or data between machines without alerting any firewalls and IDS's on a network? 

A. Covert Channel 

B. Crafted Channel 

C. Bounce Channel 

D. Deceptive Channel 

Answer:

Explanation: A covert channel is described as: "any communication channel that can be exploited by a process to transfer information in a manner that violates the systems security policy." 

Essentially, it is a method of communication that is not part of an actual computer system design, but can be used to transfer information to users or system processes that normally would not be allowed access to the information. 


Q17. This TCP flag instructs the sending system to transmit all buffered data immediately. 

A. SYN 

B. RST 

C. PSH 

D. URG 

E. FIN 

Answer: C


Q18. What is Cygwin? 

A. Cygwin is a free C++ compiler that runs on Windows 

B. Cygwin is a free Unix subsystem that runs on top of Windows 

C. Cygwin is a free Windows subsystem that runs on top of Linux 

D. Cygwin is a X Windows GUI subsytem that runs on top of Linux GNOME environment 

Answer:

Explanation: Cygwin is a Linux-like environment for Windows. It consists of two parts: 

A DLL (cygwin1.dll) which acts as a Linux API emulation layer providing substantial Linux API functionality. 

A collection of tools which provide Linux look and feel. 

The Cygwin DLL works with all non-beta, non "release candidate", ix86 32 bit versions of Windows since Windows 95, with the exception of Windows CE. 


Q19. What is a NULL scan? 

A. A scan in which all flags are turned off 

B. A scan in which certain flags are off 

C. A scan in which all flags are on 

D. A scan in which the packet size is set to zero 

E. A scan with a illegal packet size 

Answer:

Explanation: A null scan has all flags turned off. 


Q20. What is the most common vehicle for social engineering attacks? 

A. Phone 

B. Email 

C. In person 

D. P2P Networks 

Answer: A

Explanation: Pretexting is the act of creating and using an invented scenario (the pretext) to persuade a target to release information or perform an action and is usually done over the telephone.