Tips for 312-50v8 questions

Cause all that matters here is passing the EC-Council 312-50v8 exam. Cause all that you need is a high score of 312-50v8 Certified Ethical Hacker v8 exam. The only one thing you need to do is downloading Actualtests 312-50v8 exam study guides now. We will not let you down with our money-back guarantee.

2021 Feb 312-50v8 vce:

Q251. Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process..Which of the following is.the correct bit size of the Diffie-Hellman (DH) group 5? 

A. 768 bit key 

B. 1025 bit key 

C. 1536 bit key 

D. 2048 bit key 


Q252. One of the ways to map a targeted network for live hosts is by sending an ICMP ECHO request to the broadcast or the network address. The request would be broadcasted to all hosts on the targeted network. The live hosts will send an ICMP ECHO Reply to the attacker's source IP address. 

You send a ping request to the broadcast address 

There are 40 computers up and running on the target network. Only 13 hosts send a reply while others do not. Why? 

A. Windows machines will not generate an answer (ICMP ECHO Reply) to an ICMP ECHO request aimed at the broadcast address or at the network address. 

B. Linux machines will not generate an answer (ICMP ECHO Reply) to an ICMP ECHO request aimed at the broadcast address or at the network address. 

C. You should send a ping request with this command ping ? 

D. You cannot ping a broadcast address. The above scenario is wrong. 


Q253. Some passwords are stored using specialized encryption algorithms known as hashes. Why is this an appropriate method? 

A. It is impossible to crack hashed user passwords.unless the key used to encrypt them is obtained. 

B. If a user forgets the password,it can be easily retrieved using the hash key stored by administrators. 

C. Hashing is faster compared to more traditional encryption algorithms. 

D. Passwords stored using hashes are non-reversible,making finding the password much more difficult. 


Q254. What type of port scan is shown below? 

A. Idle Scan 

B. Windows Scan 

C. XMAS Scan 

D. SYN Stealth Scan 


Q255. A hacker searches in Google for filetype:pcf to find Cisco VPN config files. Those files may contain connectivity passwords that can be decoded with which of the following? 

A. Cupp 

B. Nessus 

C. Cain.and Abel 

D. John The Ripper Pro 


Renewal 312-50v8 vce:

Q256. Wayne is the senior security analyst for his company. Wayne is examining some traffic logs on a server and came across some inconsistencies. Wayne finds some IP packets from a computer purporting to be on the internal network. The packets originate from with a TTL of 15. The server replied to this computer and received a response from with a TTL of 21. What can Wayne infer from this traffic log? 

A. The initial traffic from was being spoofed. 

B. The traffic from is from a Linux computer. 

C. The TTL of 21 means that the client computer is on wireless. 

D. The client computer at is a zombie computer. 


Q257. When analyzing the IDS logs, the.system administrator notices connections from outside of the LAN have been sending packets where the Source IP address and Destination IP address.are the same. There have been no alerts sent.via email or logged in the IDS. Which type this? 

A. False positive 

B. False negative 

C. True positive 

D. True negative 


Q258. Ivan is auditing a corporate website. Using Winhex, he alters a cookie as shown below. 

Before Alteration: Cookie:; ADMIN=no; y=1 ; time=10:30GMT ; 

After Alteration: Cookie:; ADMIN=yes; y=1 ; time=12:30GMT ; 

What attack is being depicted here? 

A. Cookie Stealing 

B. Session Hijacking 

C. Cross Site Scripting 

D. Parameter Manipulation 


Q259. Which of the following tools are used for footprinting? (Choose four) 

A. Sam Spade 

B. NSLookup 

C. Traceroute 

D. Neotrace 

E. Cheops 

Answer: ABCD 

Q260. Which of the following describes the characteristics of a Boot Sector Virus? 

A. Moves the MBR to another location on the.RAM and copies itself to the original location of the MBR 

B. Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR 

C. Modifies directory table entries so that directory entries point to the virus code instead of the actual program 

D. Overwrites the original MBR and only executes the new virus code 


see more 312-50v8 dumps