Updated 312-50 free question Guide

Job hopefuls involving 312-50 are going to be gaining by using most current solutions involving EC-Council items and also having its alternatives and as such any applicants are usually sure by using good tasks. Successful 312-50 applicants are going to be gaining your dependable participant during the EC-Council organization in any among the grounds (might be during the profits discipline or perhaps the info technological know-how discipline). Because prosperous 312-50 applicants are getting to be your dependable participant during the organization, theyre going to have respect with the enterprise and also they are going to be gaining testimonials on describing in regards to the most current EC-Council solutions as well as its methods of their own mates.

The article at Testaimer.com going over http://www.testaimer.com/312-50-test is very comprehensive.

2021 Apr 312-50 practice question

Q91. What flags are set in a X-MAS scan?(Choose all that apply. 







Answer: CDF

Explanation: FIN, URG, and PSH are set high in the TCP packet for a X-MAS scan 

Q92. XSS attacks occur on Web pages that do not perform appropriate bounds checking on data entered by users. Characters like < > that mark the beginning/end of a tag should be converted into HTML entities. 

What is the correct code when converted to html entities? 

A. Option A 

B. Option B 

C. Option C 

D. Option D 

Answer: D

Q93. Annie has just succeeded is stealing a secure cookie via a XSS attack. She is able to replay the cookie even while the session is valid on the server. Why do you think this is possible? 

A. Any Cookie can be replayed irrespective of the session status 

B. The scenario is invalid as a secure cookie can’t be replayed 

C. It works because encryption is performed at the network layer (layer 1 encryption) 

D. It works because encryption is performed at the application layer (Single Encryption Key) 

Answer: D

Explanation: Single key encryption (conventional cryptography) uses a single word or phrase as the key. The same key is used by the sender to encrypt and the receiver to decrypt. Sender and receiver initially need to have a secure way of passing the key from one to the other. With TLS or SSL this would not be possible. 

Q94. You are scanning into the target network for the first time. You find very few conventional ports open. When you attempt to perform traditional service identification by connecting to the open ports, it yields either unreliable or no results. You are unsure of which protocols are being used. You need to discover as many different protocols as possible. 

Which kind of scan would you use to achieve this? (Choose the best answer) 

A. Nessus scan with TCP based pings. 

B. Nmap scan with the –sP (Ping scan) switch. 

C. Netcat scan with the –u –e switches. 

D. Nmap with the –sO (Raw IP packets) switch. 

Answer: D

Explanation: Running Nmap with the –sO switch will do a IP Protocol Scan. The IP protocol scan is a bit different than the other nmap scans. The IP protocol scan is searching for additional IP protocols in use by the remote station, such as ICMP, TCP, and UDP. If a router is scanned, additional IP protocols such as EGP or IGP may be identified. 

Q95. After studying the following log entries, how many user IDs can you identify that the attacker has tampered with? 

1. mkdir -p /etc/X11/applnk/Internet/.etc 

2. mkdir -p /etc/X11/applnk/Internet/.etcpasswd 

3. touch -acmr /etc/passwd /etc/X11/applnk/Internet/.etcpasswd 

4. touch -acmr /etc /etc/X11/applnk/Internet/.etc 

5. passwd nobody -d 

6. /usr/sbin/adduser dns -d/bin -u 0 -g 0 -s/bin/bash 

7. passwd dns -d 

8. touch -acmr /etc/X11/applnk/Internet/.etcpasswd /etc/passwd 

9. touch -acmr /etc/X11/applnk/Internet/.etc /etc 


B. acmr, dns 

C. nobody, dns 

D. nobody, IUSR_ 

Answer: C

Explanation: Passwd is the command used to modify a user password and it has been used together with the usernames nobody and dns. 

Replace 312-50 test questions:

Q96. What is a Trojan Horse? 

A. A malicious program that captures your username and password 

B. Malicious code masquerading as or replacing legitimate code 

C. An unauthorized user who gains access to your user database and adds themselves as a user 

D. A server that is to be sacrificed to all hacking attempts in order to log and monitor the hacking activity 

Answer: B

Explanation: A Trojan Horse is an apparently useful and innocent program containing additional hidden code which allows the unauthorized collection, exploitation, falsification, or destruction of data. 

Q97. Justine is the systems administrator for her company, an international shipping company with offices all over the world. Recent US regulations have forced the company to implement stronger and more secure means of communication. Justine and other administrators have been put in charge of securing the company's digital communication lines. After implementing email encryption, Justine now needs to implement robust digital signatures to ensure data authenticity and reliability. Justine has decided to implement digital signatures which are a variant of DSA and that operate on elliptical curve groups. These signatures are more efficient than DSA and are not vulnerable to a number field sieve attacks. 

What type of signature has Justine decided to implement? 

A. She has decided to implement ElGamal signatures since they offer more reliability than the typical DSA signatures 

B. Justine has decided to use ECDSA signatures since they are more efficient than DSA signatures 

C. Justine is now utilizing SHA-1 with RSA signatures to help ensure data reliability 

D. These types of signatures that Justine has decided to use are called RSA-PSS signatures 

Answer: B

Explanation: The Elliptic Curve Digital Signature Algorithm (ECDSA) is a variant of the Digital Signature Algorithm (DSA) which uses Elliptic curve cryptography. http://en.wikipedia.org/wiki/Elliptic_Curve_DSA 

Q98. Which of the following steganography utilities exploits the nature of white space and allows the user to conceal information in these white spaces? 

A. Snow 

B. Gif-It-Up 

C. NiceText 

D. Image Hide 

Answer: A

Explanation: The program snow is used to conceal messages in ASCII text by appending whitespace to the end of lines. Because spaces and tabs are generally not visible in text viewers, the message is effectively hidden from casual observers. And if the built-in encryption is used, the message cannot be read even if it is detected. 

Q99. Nathalie would like to perform a reliable scan against a remote target. She is not concerned about being stealth at this point. Which of the following type of scans would be the most accurate and reliable? 

A. A FIN Scan 

B. A Half Scan 

C. A UDP Scan 

D. The TCP Connect Scan 

Answer: D

Explanation: The connect() system call provided by your operating system is used to open a connection to every interesting port on the machine. If the port is listening, connect() will succeed, otherwise the port isn't reachable. One strong advantage to this technique is that you don't need any special privileges. This is the fastest scanning method supported by nmap, and is available with the -t (TCP) option. The big downside is that this sort of scan is easily detectable and filterable. 

Q100. What type of cookies can be generated while visiting different web sites on the Internet? 

A. Permanent and long term cookies. 

B. Session and permanent cookies. 

C. Session and external cookies. 

D. Cookies are all the same, there is no such thing as different type of cookies. 

Answer: B

Explanation: There are two types of cookies: a permanent cookie that remains on a visitor's computer for a given time and a session cookie the is temporarily saved in the visitor's computer memory during the time that the visitor is using the Web site. Session cookies disappear when you close your Web browser.