eccouncil 312-50v8 : Nov 2016 Edition

Cause all that matters here is passing the EC-Council 312-50v8 exam. Cause all that you need is a high score of 312-50v8 Certified Ethical Hacker v8 exam. The only one thing you need to do is downloading Actualtests 312-50v8 exam study guides now. We will not let you down with our money-back guarantee.

2016 Nov bittorrent 312-50v8 vce:

Q411. To see how some of the hosts on your network react, Winston sends out SYN packets to an IP range. A number of IPs respond with a SYN/ACK response. Before the connection is established he sends RST packets to those hosts to stop the session. Winston has done this to see how his intrusion detection system will log the traffic. What type of scan is Winston attempting here? 

A. Winston is attempting to find live hosts on your company's network by using an XMAS scan. 

B. He is utilizing a SYN scan to find live hosts that are listening on your network. 

C. This type of scan he is using is called a NULL scan. 

D. He is using a half-open scan to find live hosts on your network. 

Answer:


Q412. What is Cygwin? 

A. Cygwin is a free C++ compiler that runs on Windows 

B. Cygwin is a free Unix subsystem that runs on top of Windows 

C. Cygwin is a free Windows subsystem that runs on top of Linux 

D. Cygwin is a X Windows GUI subsytem that runs on top of Linux GNOME environment 

Answer:


Q413. Which of the following is a strong post designed to stop a car? 

A. Gate 

B. Fence 

C. Bollard 

D. Reinforced rebar 

Answer:


Q414. Attackers target HINFO record types stored on a DNS server to enumerate information. These are information records and potential source for reconnaissance. A network administrator has the option of entering host information specifically the CPU type and operating system when creating a new DNS record. An attacker can extract this type of information easily from a DNS server. 

Which of the following commands extracts the HINFO record? 

A. Option A 

B. Option B 

C. Option C 

D. Option D 

Answer:


Q415. Eric notices repeated probes to port 1080. He learns that the protocol being used is designed to allow a host outside of a firewall to connect transparently and securely through the firewall. He wonders if his firewall has been breached. What would be your inference? 

A. Eric network has been penetrated by a firewall breach 

B. The attacker is using the ICMP protocol to have a covert channel 

C. Eric has a Wingate package providing FTP redirection on his network 

D. Somebody is using SOCKS on the network to communicate through the firewall 

Answer:


Improved bittorrent 312-50v8 vce:

Q416. Which of the following techniques does a vulnerability scanner.use in order to detect a vulnerability on a target service? 

A. Port scanning 

B. Banner grabbing 

C. Injecting arbitrary data 

D. Analyzing service response 

Answer:


Q417. You have retrieved the raw hash values from a Windows 2000 Domain Controller. Using social engineering, you come to know that they are enforcing strong passwords. You understand that all users are required to use passwords that are at least 8 characters in length. All passwords must also use 3 of the 4 following categories: lower case letters, capital letters, numbers and special characters. 

With your existing knowledge of users, likely user account names and the possibility that they will choose the easiest passwords possible, what would be the fastest type of password cracking attack you can run against these hash values and still get results? 

A. Online Attack 

B. Dictionary Attack 

C. Brute Force Attack 

D. Hybrid Attack 

Answer:


Q418. How do you defend against ARP Poisoning attack? (Select 2 answers) 

A. Enable DHCP Snooping Binding Table 

B. Restrict ARP Duplicates 

C. Enable Dynamic ARP Inspection 

D. Enable MAC snooping Table 

Answer: AC 


Q419. What command would you type to OS fingerprint a server using the command line? 

A. Option A 

B. Option B 

C. Option C 

D. Option D 

Answer:


Q420. A security analyst is performing an audit on.the network to determine if there are any deviations from the security policies in place. The analyst.discovers that a user from the IT department had a dial-out modem installed. Which security policy must the security analyst check to see if dial-out modems are allowed? 

A. Firewall-management policy 

B. Acceptable-use policy 

C. Remote-access policy 

D. Permissive policy 

Answer:



see more 312-50v8 dumps