What will certainly you get using your purchase of the EC-Council 312-50 items are as follows: 1. Any study manual for EC-Council EC-Council test engine along with Pdf. 2. Any preview of EC-Council 312-50 true exam questions. 3. A great overview of EC-Council 312-50 on-line training study course. 4. Right answers to the 312-50 practice questions. Throw away the thicker EC-Council 312-50 books and act now and download your own EC-Council EC-Council 312-50 today! Together with our limited but beneficial EC-Council EC-Council certification exam questions and answers to take the 312-50 actual exam, you will get yourself a high tag which assures your own success.
2016 Oct 312-50 exam cost:
Q321. Derek has stumbled upon a wireless network and wants to assess its security. However, he does not find enough traffic for a good capture. He intends to use AirSnort on the captured traffic to crack the WEP key and does not know the IP address range or the AP. How can he generate traffic on the network so that he can capture enough packets to crack the WEP key?
A. Use any ARP requests found in the capture
B. Derek can use a session replay on the packets captured
C. Derek can use KisMAC as it needs two USB devices to generate traffic
D. Use Ettercap to discover the gateway and ICMP ping flood tool to generate traffic
Explanation: By forcing the network to answer to a lot of ICMP messages you can gather enough packets to crack the WEP key.
Q322. What type of port scan is represented here.
A. Stealth Scan
B. Full Scan
C. XMAS Scan
D. FIN Scan
Q323. How many bits encryption does SHA-1 use?
A. 64 bits
B. 128 bits
C. 160 bits
D. 256 bits
Explanation: SHA-1 (as well as SHA-0) produces a 160-bit digest from a message with a maximum length of 264 - 1 bits, and is based on principles similar to those used by Professor Ronald L. Rivest of MIT in the design of the MD4 and MD5 message digest algorithms.
Q324. You want to hide a secret.txt document inside c:\windows\system32\tcpip.dll kernel library using ADS streams. How will you accomplish this?
A. copy secret.txt c:\windows\system32\tcpip.dll kernel>secret.txt
B. copy secret.txt c:\windows\system32\tcpip.dll:secret.txt
C. copy secret.txt c:\windows\system32\tcpip.dll |secret.txt
D. copy secret.txt >< c:\windows\system32\tcpip.dll kernel secret.txt
Q325. John the hacker is sniffing the network to inject ARP packets. He injects broadcast frames onto the wire to conduct MiTM attack. What is the destination MAC address of a broadcast frame?
Explanation: 0xFFFFFFFFFFFF is the destination MAC address of the broadcast frame.
Updated intitle index of 312-50 pdf:
Q326. What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall if your network is comprised of Windows NT, 2000, and XP?(Choose all that apply.
Explanation: NetBIOS traffic can quickly be used to enumerate and attack Windows computers.
Ports 135, 139, and 445 should be blocked.
Q327. What is the proper response for a NULL scan if the port is closed?
F. No response
Explanation: Closed ports respond to a NULL scan with a reset.
Q328. System Administrators sometimes post questions to newsgroups when they run into technical challenges. As an ethical hacker, you could use the information in newsgroup posting to glean insight into the makeup of a target network. How would you search for these posting using Google search?
A. Search in Google using the key strings “the target company” and “newsgroups”
B. Search for the target company name at http://groups.google.com
C. Use NNTP websites to search for these postings
D. Search in Google using the key search strings “the target company” and “forums”
Explanation: Using http://groups.google.com is the easiest way to access various newsgroups today. Before http://groups.google.com you had to use special NNTP clients or subscribe to some nntp to web services.
Q329. What is the most common vehicle for social engineering attacks?
C. In person
D. P2P Networks
Explanation: Pretexting is the act of creating and using an invented scenario (the pretext) to persuade a target to release information or perform an action and is usually done over the telephone.
Q330. Which of the following Trojans would be considered 'Botnet Command Control Center'?
A. YouKill DOOM
B. Damen Rock
C. Poison Ivy D. Matten Kit
see more 312-50 dumps