Exam Details

  • Exam Code
    :312-50
  • Exam Name
    :Certified Ethical Hacker
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :614 Q&As
  • Last Updated
    :Apr 16, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50 Questions & Answers

  • Question 221:

    A file integrity program such as Tripwire protects against Trojan horse attacks by:

    A. Automatically deleting Trojan horse programs

    B. Rejecting packets generated by Trojan horse programs

    C. Using programming hooks to inform the kernel of Trojan horse behavior

    D. Helping you catch unexpected changes to a system utility file that might indicate it had been replaced by a Trojan horse

  • Question 222:

    Sniffing is considered an active attack.

    A. True

    B. False

  • Question 223:

    Which of the following Netcat commands would be used to perform a UDP scan of the lower 1024 ports?

    A. Netcat -h -U

    B. Netcat -hU

    C. Netcat -sU -p 1-1024

    D. Netcat -u -v -w2 1-1024

    E. Netcat -sS -O target/1024

  • Question 224:

    Exhibit: * Missing*

    Jason's Web server was attacked by a trojan virus. He runs protocol analyzer and notices that the trojan communicates to a remote server on the Internet. Shown below is the standard "hexdump" representation of the network packet, before

    being decoded. Jason wants to identify the trojan by looking at the destination port number and mapping to a trojan-port number database on the Internet. Identify the remote server's port number by decoding the packet?

    A. Port 1890 (Net-Devil Trojan)

    B. Port 1786 (Net-Devil Trojan)

    C. Port 1909 (Net-Devil Trojan)

    D. Port 6667 (Net-Devil Trojan)

  • Question 225:

    John wishes to install a new application onto his Windows 2000 server. He wants to ensure that any application he uses has not been Trojaned. What can he do to help ensure this?

    A. Compare the file's MD5 signature with the one published on the distribution media

    B. Obtain the application via SSL

    C. Compare the file's virus signature with the one published on the distribution media

    D. Obtain the application from a CD-ROM disc

  • Question 226:

    In Linux, the three most common commands that hackers usually attempt to Trojan are:

    A. car, xterm, grep

    B. netstat, ps, top

    C. vmware, sed, less

    D. xterm, ps, nc

  • Question 227:

    You suspect that your Windows machine has been compromised with a Trojan virus. When you run anti-virus software it does not pick of the Trojan. Next you run netstat command to look for open ports and you notice a strange port 6666 open.

    What is the next step you would do?

    A. Re-install the operating system.

    B. Re-run anti-virus software.

    C. Install and run Trojan removal software.

    D. Run utility fport and look for the application executable that listens on port 6666.

  • Question 228:

    You have hidden a Trojan file virus.exe inside another file readme.txt using NTFS streaming.

    Which command would you execute to extract the Trojan to a standalone file?

    A. c:\> type readme.txt:virus.exe > virus.exe

    B. c:\> more readme.txt | virus.exe > virus.exe

    C. c:\> cat readme.txt:virus.exe > virus.exe

    D. c:\> list redme.txt$virus.exe > virus.exe

  • Question 229:

    Which of the following statements would not be a proper definition for a Trojan Horse?

    A. An unauthorized program contained within a legitimate program.This unauthorized program performs functions unknown (and probably unwanted) by the user.

    B. A legitimate program that has been altered by the placement of unauthorized code within it; this code perform functions unknown (and probably unwanted) by the user.

    C. An authorized program that has been designed to capture keyboard keystrokes while the user remains unaware of such an activity being performed.

    D. Any program that appears to perform a desirable and necessary function but that (because of unauthorized code within it that is unknown to the user) performs functions unknown (and definitely unwanted) by the user.

  • Question 230:

    After an attacker has successfully compromised a remote computer, what would be one of the last steps that would be taken to ensure that the compromise is not traced back to the source of the problem?

    A. Install pactehs

    B. Setup a backdoor

    C. Cover your tracks

    D. Install a zombie for DDOS

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.