A Review Of Precise 312-50 practice

We promise that you will also certainly pass the real exam without virtually any difficulties. 100% passing guarantee is not hollow words. However, in the event you really dont obtain through the EC-Council real certification exam, no matter what? cause, we provide full cash back in the paying fees. Zero questions asked!


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for EC-Council 312-50 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 312-50 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/312-50-exam-dumps.html

2021 Apr 312-50 exam

Q61. Jim’s organization has just completed a major Linux roll out and now all of the organization’s systems are running the Linux 2.5 kernel. The roll out expenses has posed constraints on purchasing other essential security equipment and software. The organization requires an option to control network traffic and also perform stateful inspection of traffic going into and out of the DMZ. 

Which built-in functionality of Linux can achieve this? 

A. IP Tables 

B. IP Chains 

C. IP Sniffer 

D. IP ICMP 

Answer: A

Explanation: iptables is a user space application program that allows a system administrator to configure the netfilter tables, chains, and rules (described above). Because iptables requires elevated privileges to operate, it must be executed by user root, otherwise it fails to function. On most Linux systems, iptables is installed as /sbin/iptables. IP Tables performs stateful inspection while the older IP Chains only performs stateless inspection. 


Q62. "Testing the network using the same methodologies and tools employed by attackers" Identify the correct terminology that defines the above statement. 

A. Vulnerability Scanning 

B. Penetration Testing 

C. Security Policy Implementation 

D. Designing Network Security 

Answer: B


Q63. _____ is a type of symmetric-key encryption algorithm that transforms a fixed-length block of plaintext (unencrypted text) data into a block of ciphertext (encrypted text) data of the same length. 

A. Bit Cipher 

B. Hash Cipher 

C. Block Cipher 

D. Stream Cipher 

Answer: C

Explanation: A block cipher is a symmetric key cipher which operates on fixed-length groups of bits, termed blocks, with an unvarying transformation. When encrypting, a block cipher might take a (for example) 128-bit block of plaintext as input, and output a corresponding 128-bit block of ciphertext. 


Q64. While testing web applications, you attempt to insert the following test script into the search area on the company's web site: 

<script>alert('Testing Testing Testing')</script> 

Afterwards, when you press the search button, a pop up box appears on your screen with the text "Testing Testing Testing". What vulnerability is detected in the web application here? 

A. A hybrid attack 

B. A buffer overflow 

C. Password attacks 

D. Cross Site Scripting 

Answer: D

Explanation: Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users. Examples of such code include HTML code and client-side scripts. An exploited cross-site scripting vulnerability can be used by attackers to bypass access controls such as the same origin policy. 


Q65. Which address translation scheme would allow a single public IP address to always correspond to a single machine on an internal network, allowing "server publishing"? 

A. Overloading Port Address Translation 

B. Dynamic Port Address Translation 

C. Dynamic Network Address Translation 

D. Static Network Address Translation 

Answer: D

Explanation: Mapping an unregistered IP address to a registered IP address on a one-to-one basis. Particularly useful when a device needs to be accessible from outside the network. 


Up to date 312-50 exam question:

Q66. The SNMP Read-Only Community String is like a password. The string is sent along with each SNMP Get-Request and allows (or denies) access to a device. Most network vendors ship their equipment with a default password of "public". This is the so-called "default public community string". How would you keep intruders from getting sensitive information regarding the network devices using SNMP? (Select 2 answers) 

A. Enable SNMPv3 which encrypts username/password authentication 

B. Use your company name as the public community string replacing the default 'public' 

C. Enable IP filtering to limit access to SNMP device 

D. The default configuration provided by device vendors is highly secure and you don't need to change anything 

Answer: AC


Q67. Marshall is the information security manager for his company. Marshall was just hired on two months ago after the last information security manager retired. Since the last manager did not implement or even write IT policies, Marshall has begun writing IT security policies to cover every conceivable aspect. Marshall's supervisor has informed him that while most employees will be under one set of policies, ten other employees will be under another since they work on computers in publicly-accessible areas. Per his supervisor, Marshall has written two sets of policies. For the users working on publicly-accessible computers, their policies state that everything is forbidden. They are not allowed to browse the Internet or even use email. The only thing they can use is their work related applications like Word and Excel. 

What types of policies has Marshall written for the users working on computers in the publicly-accessible areas? 

A. He has implemented Permissive policies for the users working on public computers 

B. These types of policies would be considered Promiscuous policies 

C. He has written Paranoid policies for these users in public areas 

D. Marshall has created Prudent policies for the computer users in publicly-accessible areas 

Answer: C

Explanation: It says that everything is forbidden, this means that there is a Paranoid Policy implemented 


Q68. Stephanie works as senior security analyst for a manufacturing company in Detroit. Stephanie manages network security throughout the organization. Her colleague Jason told her in confidence that he was able to see confidential corporate information posted on the external website http://www.jeansclothesman.com. He tries random URLs on the company's website and finds confidential information leaked over the web. Jason says this happened about a month ago. Stephanie visits the said URLs, but she finds nothing. She is very concerned about this, since someone should be held accountable if there was sensitive information posted on the website. 

Where can Stephanie go to see past versions and pages of a website? 

A. She should go to the web page Samspade.org to see web pages that might no longer be on the website 

B. If Stephanie navigates to Search.com; she will see old versions of the company website 

C. Stephanie can go to Archive.org to see past versions of the company website 

D. AddressPast.com would have any web pages that are no longer hosted on the company's website 

Answer: C


Q69. Daryl is a network administrator working for Dayton Technologies. Since Daryl’s background is in web application development, many of the programs and applications his company uses are web-based. Daryl sets up a simple forms-based logon screen for all the applications he creates so they are secure. 

The problem Daryl is having is that his users are forgetting their passwords quite often and sometimes he does not have the time to get into his applications and change the passwords for them. Daryl wants a tool or program that can monitor web-based passwords and notify him when a password has been changed so he can use that tool whenever a user calls him and he can give them their password right then. 

What tool would work best for Daryl’s needs? 

A. Password sniffer 

B. L0phtcrack 

C. John the Ripper 

D. WinHttrack 

Answer:

Explanation: L0phtCrack is a password auditing and recovery application (now called LC5), originally produced by Mudge from L0pht Heavy Industries. It is used to test password strength and sometimes to recover lost Microsoft Windows passwords. John the Ripper is one of the most popular password testing/breaking programs as it combines a number of password crackers into one package, autodetects password hash types, and includes a customisable cracker. It can be run against various encrypted password formats including several crypt password hash types WinHttrack is a offline browser. A password sniffer would give Daryl the passwords when they are changed as it is a web based authentication over a simple form but still it would be more correct to give the users new passwords instead of keeping a copy of the passwords in clear text. 


Q70. You are concerned that someone running PortSentry could block your scans, and you decide to slow your scans so that no one detects them. Which of the following commands will help you achieve this? 

A. nmap -sS -PT -PI -O -T1 <ip address> 

B. nmap -sO -PT -O -C5 <ip address> 

C. nmap -sF -PT -PI -O <ip address> 

D. nmap -sF -P0 -O <ip address> 

Answer:

Explanation: -T[0-5]: Set timing template (higher is faster)