The Rebirth Guide To 312-50 Exam Prep

Our pass rate is high to 98.9% and the similarity percentage between our 312-50 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the EC-Council 312-50 exam in just one try? I am currently studying for the EC-Council 312-50 exam. Latest EC-Council 312-50 Test exam practice questions and answers, Try EC-Council 312-50 Brain Dumps First.

Check 312-50 free dumps before getting the full version:

Page: 1 / 63
Total 765 questions Full Exam Access
Question 1
- (Topic 15)
While probing an organization you discover that they have a wireless network. From your attempts to connect to the WLAN you determine that they have deployed MAC filtering by using ACL on the access points. What would be the easiest way to circumvent and communicate on the WLAN?
My answer: -
Reference answer: D
Reference analysis:

The easiest way to gain access to the WLAN would be to spoof your MAC address to one that already exists on the network.

Question 2
- (Topic 19)
Carl has successfully compromised a web server from behind a firewall by exploiting a vulnerability in the web server program. He wants to proceed by installing a backdoor program. However, he is aware that not all inbound ports on the firewall are in the open state.
From the list given below, identify the port that is most likely to be open and allowed to reach the server that Carl has just compromised.
My answer: -
Reference answer: A
Reference analysis:

Port 53 is used by DNS and is almost always open, the problem is often that the port is opened for the hole world and not only for outside DNS servers.

Question 3
DRAG DROP - (Topic 4)
Drag the application to match with its correct description.
Exhibit:
312-50 dumps exhibit
Solution:
312-50 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 4
- (Topic 17)
What does the this symbol mean?
312-50 dumps exhibit
My answer: -
Reference answer: A
Reference analysis:

This symbol is a “warchalking” symbol for a open node (open circle) with the SSID tsunami and the bandwidth 2.0 Mb/s

Question 5
- (Topic 22)
Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?
My answer: -
Reference answer: D
Reference analysis:

Sending a bogus email is one way to find out more about internal servers. Also, to gather additional IP addresses and learn how they treat mail.

Question 6
- (Topic 3)
While performing ping scans into a target network you get a frantic call from the organization’s security team. They report that they are under a denial of service attack. When you stop your scan, the smurf attack event stops showing up on the organization’s IDS monitor. How can you modify your scan to prevent triggering this event in the IDS?
My answer: -
Reference answer: B
Reference analysis:

Scanning the broadcast address makes the scan target all IP addresses on that subnet at the same time.

Question 7
- (Topic 3)
What are the four steps is used by nmap scanning?
My answer: -
Reference answer: ACDF
Reference analysis:

Nmap performs four steps during a normal device scan. Some of these steps can be modified or disabled using options on the nmap command line.
✑ If a hostname is used as a remote device specification, nmap will perform a DNS
lookup prior to the scan.
✑ Nmap pings the remote device. This refers to the nmap "ping" process, not (necessarily) a traditional ICMP echo request.
✑ If an IP address is specified as the remote device, nmap will perform a reverse DNS lookup in an effort to identify a name that might be associated with the IP address. This is the opposite process of what happens in step 1, where an IP address is found from a hostname specification.
✑ Nmap executes the scan. Once the scan is over, this four-step process is completed. Except for the actual scan process in step four, each of these steps can be disabled or prevented using different IP addressing or nmap options. The nmap process can be as "quiet" or as "loud" as necessary!

Question 8
- (Topic 23)
Jason is the network administrator of Spears Technology. He has enabled SNORT IDS to detect attacks going through his network. He receives Snort SMS alerts on his iPhone whenever there is an attempted intrusion to his network.
He receives the following SMS message during the weekend.
312-50 dumps exhibit
An attacker Chew Siew sitting in Beijing, China had just launched a remote scan on Jason's network with the hping command.
Which of the following hping2 command is responsible for the above snort alert?
My answer: -
Reference answer: A
Reference analysis:

None

Question 9
- (Topic 20)
Buffer X is an Accounting application module for company can contain 200 characters. The programmer makes an assumption that 200 characters are more than enough. Because there were no proper boundary checks being conducted. Dave decided to insert 400 characters into the 200-character buffer which overflows the buffer. Below is the code snippet:
Void func (void)
{int I; char buffer [200];
for (I=0; I<400; I++)
buffer (I)= ‘A’; return;
}
How can you protect/fix the problem of your application as shown above? (Choose two)
My answer: -
Reference answer: AC
Reference analysis:

I=199 would be the character number 200. The stack holds exact 200 characters so there is no need to stop before 200.

Question 10
- (Topic 15)
In order to attack a wireless network, you put up an access point and override the signal of the real access point. As users send authentication data, you are able to capture it. What kind of attack is this?
My answer: -
Reference answer: C
Reference analysis:

The definition of a Rogue access point is:1. A wireless access point (AP) installed by an employee without the consent of the IT department. Without the proper security configuration, users have exposed their company\'s network to the outside world.2. An access point (AP) set up by an attacker outside a facility with a wireless network. Also called an "evil twin," the rogue AP picks up beacons (signals that advertise its presence) from the company\'s legitimate AP and transmits identical beacons, which some client machines inside the building associate with.

Question 11
- (Topic 5)
You have successfully brute forced basic authentication configured on a Web Server using Brutus hacking tool. The username/password is “Admin” and “Bettlemani@”. You logon to the system using the brute forced password and plant backdoors and rootkits.
After downloading various sensitive documents from the compromised machine, you proceed to clear the log files to hide your trace..
Which event log located at C:\Windows\system32\config contains the trace of your brute force attempts?
My answer: -
Reference answer: B
Reference analysis:

The Security Event log (SecEvent.Evt) will contain all the failed logins against the system.

Question 12
- (Topic 11)
Take a look at the following attack on a Web Server using obstructed URL:
http://www.example.com/script.ext?template%2e%2e%2e%2e%2e%2f%2e%2f%65%74% 63%2f%70%61%73%73%77%64
The request is made up of:
✑ %2e%2e%2f%2e%2e%2f%2e%2f% = ../../../
✑ %65%74%63 = etc
✑ %2f = /
✑ %70%61%73%73%77%64 = passwd
How would you protect information systems from these attacks?
My answer: -
Reference answer: B
Reference analysis:

This is a typical Unicode attack. By configuring your IDS to trigger on strange Unicode requests you can protect your web-server from this type of attacks.

Question 13
- (Topic 15)
Which of the following wireless technologies can be detected by NetStumbler? (Select all that apply)
My answer: -
Reference answer: ACD
Reference analysis:

If you check the website, cards for all three (A, B, G) are supported. See: http://www.stumbler.net/

Question 14
- (Topic 18)
Jim’s organization has just completed a major Linux roll out and now all of the organization’s systems are running the Linux 2.5 kernel. The roll out expenses has posed constraints on purchasing other essential security equipment and software. The organization requires an option to control network traffic and also perform stateful inspection of traffic going into and out of the DMZ.
Which built-in functionality of Linux can achieve this?
My answer: -
Reference answer: A
Reference analysis:

iptables is a user space application program that allows a system administrator to configure the netfilter tables, chains, and rules (described above). Because iptables requires elevated privileges to operate, it must be executed by user root, otherwise it fails to function. On most Linux systems, iptables is installed as /sbin/iptables. IP Tables performs stateful inspection while the older IP Chains only performs stateless inspection.

Question 15
- (Topic 21)
How many bits encryption does SHA-1 use?
My answer: -
Reference answer: C
Reference analysis:

SHA-1 (as well as SHA-0) produces a 160-bit digest from a message with a maximum length of 264 - 1 bits, and is based on principles similar to those used by Professor Ronald L. Rivest of MIT in the design of the MD4 and MD5 message digest algorithms.

Question 16
- (Topic 5)
What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?
My answer: -
Reference answer: C
Reference analysis:

All are DDOS tools.

Question 17
- (Topic 23)
Blane is a security analyst for a law firm. One of the lawyers needs to send out an email to a client but he wants to know if the email is forwarded on to any other recipients. The client is explicitly asked not to re-send the email since that would be a violation of the lawyer's and client's agreement for this particular case. What can Blane use to accomplish this?
My answer: -
Reference answer: D
Reference analysis:

None

Question 18
- (Topic 5)
You have retrieved the raw hash values from a Windows 2000 Domain Controller. Using social engineering, you come to know that they are enforcing strong passwords. You understand that all users are required to use passwords that are at least 8 characters in length. All passwords must also use 3 of the 4 following categories: lower case letters, capital letters, numbers and special characters.
With your existing knowledge of users, likely user account names and the possibility that they will choose the easiest passwords possible, what would be the fastest type of password cracking attack you can run against these hash values and still get results?
My answer: -
Reference answer: D
Reference analysis:

A dictionary attack will not work as strong passwords are enforced, also the minimum length of 8 characters in the password makes a brute force attack time consuming. A hybrid attack where you take a word from a dictionary and exchange a number of letters with numbers and special characters will probably be the fastest way to crack the passwords.

Question 19
- (Topic 23)
Web servers are often the most targeted and attacked hosts on organizations' networks. Attackers may exploit software bugs in the Web server, underlying operating system, or active content to gain unauthorized access.
312-50 dumps exhibit
Identify the correct statement related to the above Web Server installation?
My answer: -
Reference answer: C
Reference analysis:

None

Question 20
- (Topic 3)
You want to scan the live machine on the LAN, what type of scan you should use?
My answer: -
Reference answer: E
Reference analysis:

The ping scan is one of the quickest scans that nmap performs, since no actual ports are queried. Unlike a port scan where thousands of packets are transferred between two stations, a ping scan requires only two frames. This scan is useful for locating active devices or determining if ICMP is passing through a firewall.

Question 21
- (Topic 13)
You have chosen a 22 character word from the dictionary as your password. How long will it take to crack the password by an attacker?
My answer: -
Reference answer: A
Reference analysis:

A dictionary password cracker simply takes a list of dictionary words, and one at a time encrypts them to see if they encrypt to the one way hash from the system. If the hashes are equal, the password is considered cracked, and the word tried from the dictionary list is the password. As long as you use a word found in or similar to a word found in a dictionary the password is considered to be weak.

Question 22
- (Topic 3)
One of the ways to map a targeted network for live hosts is by sending an ICMP ECHO request to the broadcast or the network address. The request would be broadcasted to all hosts on the targeted network. The live hosts will send an ICMP ECHO Reply to the attacker source IP address.
You send a ping request to the broadcast address 192.168.5.255. [root@ceh/root]# ping -b 192.168.5.255
WARNING: pinging broadcast address
PING 192.168.5.255 (192.168.5.255) from 192.168.5.1 : 56(84) bytes of data.
64 bytes from 192.168.5.1: icmp_seq=0 ttl=255 time=4.1 ms 64 bytes from 192.168.5.5: icmp_seq=0 ttl=255 time=5.7 ms
---
---
---
There are 40 computers up and running on the target network. Only 13 hosts send a reply while others do not. Why?
My answer: -
Reference answer: D
Reference analysis:

As stated in the correct option, Microsoft Windows does not handle pings to a broadcast address correctly and therefore ignores them.

Question 23
- (Topic 23)
You are configuring the security options of your mail server and you would like to block certain file attachments to prevent viruses and malware from entering the users inbox.
Which of the following file formats will you block?
(Select up to 6)
My answer: -
Reference answer: BCEFIJ
Reference analysis:

http://office.microsoft.com/en-us/outlook/HP030850041033.aspx

Question 24
- (Topic 10)
After a client sends a connection request (SYN) packet to the server, the server will respond (SYN-ACK) with a sequence number of its choosing, which then must be acknowledge (ACK) by the client. This sequence number is predictable; the attack connects to a service first with its own IP address, records the sequence number chosen and then opens a second connection from a forget IP address. The attack doesn’t see the SYN-ACK (or any other packet) from the server, but can guess the correct responses. If the source IP Address is used for authentication, the attacker can use the one-side communication to break into the server.
What attacks can you successfully launch against a server using the above technique?
My answer: -
Reference answer: A
Reference analysis:

The term Session Hijacking refers to the exploitation of a valid computer session - sometimes also called a session key - to gain unauthorised access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a remote server. It has particular relevance to web developers, as the HTTP cookies used to maintain a session on many web sites can be easily stolen by an attacker using an intermediary computer or with access to the saved cookies on the victim\'s computer.

Question 25
- (Topic 23)
What is the name of the software tool used to crack a single account on Netware Servers using a dictionary attack?
My answer: -
Reference answer: B
Reference analysis:

NWPCrack is the software tool used to crack single accounts on Netware servers.

Question 26
- (Topic 12)
Which of the following statements best describes the term Vulnerability?
My answer: -
Reference answer: A
Reference analysis:

Vulnerabilities are all weaknesses that can be exploited.

Question 27
- (Topic 23)
Switches maintain a CAM Table that maps individual MAC addresses on the network to physical ports on the switch.
312-50 dumps exhibit
In MAC flooding attack, a switch is fed with many Ethernet frames, each containing different source MAC addresses, by the attacker. Switches have a limited memory for mapping various MAC addresses to physical ports. What happens when the CAM table becomes full?
My answer: -
Reference answer: A
Reference analysis:

None

Question 28
- (Topic 18)
What is the expected result of the following exploit?
312-50 dumps exhibit
My answer: -
Reference answer: A
Reference analysis:

The script being depicted is in perl (both msadc.pl and the script their using as a wrapper) -
- $port, $your, $user, $pass, $host are variables that hold the port # of a DNS server, an IP, username, and FTP password. $host is set to argument variable 0 (which means the string typed directly after the command). Essentially what happens is it connects to an FTP server and downloads nc.exe (the TCP/IP swiss-army knife -- netcat) and uses nc to open a TCP port spawning cmd.exe (cmd.exe is the Win32 DOS shell on NT/2000/2003/XP), cmd.exe when spawned requires NO username or password and has the permissions of the username it is being executed as (probably guest in this instance, although it could be administrator). The #\'s in the script means the text following is a comment, notice the last line in particular, if the # was removed the script would spawn a connection to itself, the host system it was running on.

Question 29
- (Topic 11)
____ will let you assume a users identity at a dynamically generated web page or site.
My answer: -
Reference answer: C
Reference analysis:

Cross site scripting is also referred to as XSS or CSS. You must know the user is online and you must scam that user into clicking on a link that you have sent in order for this hack attack to work.

Question 30
- (Topic 20)
The programmers on your team are analyzing the free, open source software being used to run FTP services on a server. They notice that there is an excessive number of fgets() and gets() on the source code. These C++ functions do not check bounds.
What kind of attack is this program susceptible to?
My answer: -
Reference answer: A
Reference analysis:

C users must avoid using dangerous functions that do not check bounds unless they\'ve ensured that the bounds will never get exceeded. A buffer overflow occurs when you write a set of values (usually a string of characters) into a fixed length buffer and write at least one value outside that buffer\'s boundaries (usually past its end). A buffer overflow can occur when reading input from the user into a buffer, but it can also occur during other kinds of processing in a program.

Page: 1 / 63
Total 765 questions Full Exam Access