Exam Details

  • Exam Code
    :312-50
  • Exam Name
    :Certified Ethical Hacker
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :614 Q&As
  • Last Updated
    :Apr 16, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50 Questions & Answers

  • Question 281:

    What is the goal of a Denial of Service Attack?

    A. Capture files from a remote computer.

    B. Render a network or computer incapable of providing normal service.

    C. Exploit a weakness in the TCP stack.

    D. Execute service at PS 1009.

  • Question 282:

    What is the term 8 to describe an attack that falsifies a broadcast ICMP echo request and includes a primary and secondary victim?

    A. Fraggle Attack

    B. Man in the Middle Attack

    C. Trojan Horse Attack

    D. Smurf Attack

    E. Back Orifice Attack

  • Question 283:

    What happens during a SYN flood attack?

    A. TCP connection requests floods a target machine is flooded with randomized source address and ports for the TCP ports.

    B. A TCP SYN packet, which is a connection initiation, is sent to a target machine, giving the target host's address as both source and destination, and is using the same port on the target host as both source and destination.

    C. A TCP packet is received with the FIN bit set but with no ACK bit set in the flags field.

    D. A TCP packet is received with both the SYN and the FIN bits set in the flags field.

  • Question 284:

    A denial of Service (DoS) attack works on the following principle:

    A. MS-DOS and PC-DOS operating system utilize a weaknesses that can be compromised and permit them to launch an attack easily.

    B. All CLIENT systems have TCP/IP stack implementation weakness that can be compromised and permit them to lunch an attack easily.

    C. Overloaded buffer systems can easily address error conditions and respond appropriately.

    D. Host systems cannot respond to real traffic, if they have an overwhelming number of incomplete connections (SYN/RCVD State).

    E. A server stops accepting connections from certain networks one those network become flooded.

  • Question 285:

    Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?

    A. Teardrop

    B. Smurf

    C. Ping of Death

    D. SYN flood

    E. SNMP Attack

  • Question 286:

    What happens when one experiences a ping of death?

    A. This is when an IP datagram is received with the "protocol" field in the IP header set to 1 (ICMP) and the "type" field in the ICMP header is set to 18 (Address Mask Reply).

    B. This is when an IP datagram is received with the "protocol" field in the IP header set to 1 (ICMP), the Last Fragment bit is set, and (IP offset ` 8) + (IP data length) >65535.In other words, the IP offset (which represents the starting position of this fragment in the original packet, and which is in 8-byte units) plus the rest of the packet is greater than the maximum size for an IP packet.

    C. This is when an IP datagram is received with the "protocol" field in the IP header set to 1 (ICMP) and the source equal to destination address.

    D. This is when an the IP header is set to 1 (ICMP) and the "type" field in the ICMP header is set to 5 (Redirect).

  • Question 287:

    Global deployment of RFC 2827 would help mitigate what classification of attack?

    A. Sniffing attack

    B. Denial of service attack

    C. Spoofing attack

    D. Reconnaissance attack

    E. Prot Scan attack

  • Question 288:

    The evil hacker, is purposely sending fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes. From the information given, what type of attack is attempting to perform?

    A. Syn flood

    B. Smurf

    C. Ping of death

    D. Fraggle

  • Question 289:

    Which one of the following instigates a SYN flood attack?

    A. Generating excessive broadcast packets.

    B. Creating a high number of half-open connections.

    C. Inserting repetitive Internet Relay Chat (IRC) messages.

    D. A large number of Internet Control Message Protocol (ICMP) traces.

  • Question 290:

    What is the most common vehicle for social engineering attacks?

    A. Email

    B. Direct in person

    C. Local Area Networks

    D. Peer to Peer Networks

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.