Top EC-Council 312-50 ebook Choices

It is more faster and easier to pass the EC-Council 312-50 exam by using Printable EC-Council Ethical Hacking and Countermeasures (CEHv6) questuins and answers. Immediate access to the Far out 312-50 Exam and find the same core area 312-50 questions with professionally verified answers, then PASS your exam with a high score now.


The article at Testaimer.com going over http://www.testaimer.com/312-50-test is very comprehensive.

2021 Mar 312-50 free practice exam

Q371. Which of the following act in the united states specifically criminalizes the transmission of unsolicited commercial e-mail(SPAM) without an existing business relationship. 

A. 2004 CANSPAM Act 

B. 2003 SPAM Preventing Act 

C. 2005 US-SPAM 1030 Act 

D. 1990 Computer Misuse Act 

Answer: A

Explanation: The CAN-SPAM Act of 2003 (Controlling the Assault of Non-Solicited Pornography and Marketing Act) establishes requirements for those who send commercial email, spells out penalties for spammers and companies whose products are advertised in spam if they violate the law, and gives consumers the right to ask emailers to stop spamming them. The law, which became effective January 1, 2004, covers email whose primary purpose is advertising or promoting a commercial product or service, including content on a Web site. A "transactional or relationship message" – email that facilitates an agreed-upon transaction or updates a customer in an existing business relationship – may not contain false or misleading routing information, but otherwise is exempt from most provisions of the CAN-SPAM Act. 


Q372. SNMP is a connectionless protocol that uses UDP instead of TCP packets? (True or False) 

A. True 

B. False 

Answer: A

Explanation: TCP and UDP provide transport services. But UDP was preferred. This is due to TCP characteristics, it is a complicate protocol and it consume to many memory and CPU resources. Where as UDP is easy to build and run. Into devices (repeaters and modems) vendors have built simple version of IP and UDP. 


Q373. You have been called to investigate a sudden increase in network traffic at company. It seems that the traffic generated was too heavy that normal business functions could no longer be rendered to external employees and clients. After a quick investigation, you find that the computer has services running attached to TFN2k and Trinoo software. What do you think was the most likely cause behind this sudden increase in traffic? 

A. A distributed denial of service attack. 

B. A network card that was jabbering. 

C. A bad route on the firewall. 

D. Invalid rules entry at the gateway. 

Answer: A

Explanation: In computer security, a denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended users. Typically the targets are high-profile web servers, and the attack attempts to make the hosted web pages unavailable on the Internet. It is a computer crime that violates the Internet proper use policy as indicated by the Internet Architecture Board (IAB). TFN2K and Trinoo are tools used for conducting DDos attacks. 


Q374. What is the correct order of steps in CEH System Hacking Cycle? 

A. Option A 

B. Option B 

C. Option C 

D. Option D 

Answer: A


Q375. What are the main drawbacks for anti-virus software? 

A. AV software is difficult to keep up to the current revisions. 

B. AV software can detect viruses but can take no action. 

C. AV software is signature driven so new exploits are not detected. 

D. It’s relatively easy for an attacker to change the anatomy of an attack to bypass AV systems 

E. AV software isn’t available on all major operating systems platforms. 

F. AV software is very machine (hardware) dependent. 

Answer: C

Explanation: Although there are functions like heuristic scanning and sandbox technology, the Antivirus program is still mainly depending of signature databases and can only find already known viruses. 


Renewal 312-50 dumps:

Q376. On wireless networks, SSID is used to identify the network. Why are SSID not considered to be a good security mechanism to protect a wireless networks? 

A. The SSID is only 32 bits in length. 

B. The SSID is transmitted in clear text. 

C. The SSID is the same as the MAC address for all vendors. 

D. The SSID is to identify a station, not a network. 

Answer: B

Explanation: The SSID IS constructed to identify a network, it IS NOT the same as the MAC address and SSID’s consists of a maximum of 32 alphanumeric characters. 


Q377. Samuel is the network administrator of DataX communications Inc. He is trying to configure his firewall to block password brute force attempts on his network. He enables blocking the intruder’s IP address for a period of 24 hours time after more than three unsuccessful attempts. He is confident that this rule will secure his network hackers on the Internet. 

But he still receives hundreds of thousands brute-force attempts generated from various IP addresses around the world. After some investigation he realizes that the intruders are using a proxy somewhere else on the Internet which has been scripted to enable the random usage of various proxies on each request so as not to get caught by the firewall use. 

Later he adds another rule to his firewall and enables small sleep on the password attempt so that if the password is incorrect, it would take 45 seconds to return to the user to begin another attempt. Since an intruder may use multiple machines to brute force the password, he also throttles the number of connections that will be prepared to accept from a particular IP address. This action will slow the intruder’s attempts. 

Samuel wants to completely block hackers brute force attempts on his network. 

What are the alternatives to defending against possible brute-force password attacks on his site? 

A. Enforce a password policy and use account lockouts after three wrong logon attempts even through this might lock out legit users 

B. Enable the IDS to monitor the intrusion attempts and alert you by e-mail about the IP address of the intruder so that you can block them at the firewall manually 

C. Enforce complex password policy on your network so that passwords are more difficult to brute force 

D. You can’t completely block the intruders attempt if they constantly switch proxies 

Answer: D

Explanation: Without knowing from where the next attack will come there is no way of proactively block the attack. This is becoming a increasing problem with the growth of large bot nets using ordinary workstations and home computers in large numbers. 


Q378. Your boss is attempting to modify the parameters of a Web-based application in order to alter the SQL statements that are parsed to retrieve data from the database. What would you call such an attack? 

A. SQL Input attack 

B. SQL Piggybacking attack 

C. SQL Select attack 

D. SQL Injection attack 

Answer: D

Explanation: This technique is known as SQL injection attack 


Q379. DRAG DROP 

Drag the term to match with it’s description 

Exhibit: 

Answer: 


Q380. War dialing is one of the oldest methods of gaining unauthorized access to the target systems, it is one of the dangers most commonly forgotten by network engineers and system administrators. A hacker can sneak past all the expensive firewalls and IDS and connect easily into the network. Through wardialing an attacker searches for the devices located in the target network infrastructure that are also accessible through the telephone line. 

‘Dial backup’ in routers is most frequently found in networks where redundancy is required. Dial-on-demand routing(DDR) is commonly used to establish connectivity as a backup. 

As a security testers, how would you discover what telephone numbers to dial-in to the router? 

A. Search the Internet for leakage for target company’s telephone number to dial-in 

B. Run a war-dialing tool with range of phone numbers and look for CONNECT Response 

C. Connect using ISP’s remote-dial in number since the company’s router has a leased line connection established with them 

D. Brute force the company’s PABX system to retrieve the range of telephone numbers to dial-in 

Answer:

Explanation: Use a program like Toneloc to scan the company’s range of phone numbers.