Exam Details

  • Exam Code
    :312-50
  • Exam Name
    :Certified Ethical Hacker
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :614 Q&As
  • Last Updated
    :Apr 16, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50 Questions & Answers

  • Question 301:

    What does the following command achieve?

    Telnet

    HEAD /HTTP/1.0

    A. This command returns the home page for the IP address specified

    B. This command opens a backdoor Telnet session to the IP address specified

    C. This command returns the banner of the website specified by IP address

    D. This command allows a hacker to determine the sites security

    E. This command is bogus and will accomplish nothing

  • Question 302:

    What are the six types of social engineering?(Choose six).

    A. Spoofing

    B. Reciprocation

    C. Social Validation

    D. Commitment

    E. Friendship

    F. Scarcity

    G. Authority

    H. Accountability

  • Question 303:

    Usernames, passwords, e-mail addresses, and the location of CGI scripts may be obtained from which of the following information sources?

    A. Company web site

    B. Search engines

    C. EDGAR Database query

    D. Whois query

  • Question 304:

    Jack Hacker wants to break into Brown Co.'s computers and obtain their secret double fudge cookie recipe. Jack calls Jane, an accountant at Brown Co., pretending to be an administrator from Brown Co. Jack tells Jane that there has been a problem with some accounts and asks her to tell him her password 'just to double check our records'. Jane believes that Jack is really an administrator, and tells him her password. Jack now has a user name and password, and can access Brown Co.'s computers, to find the cookie recipe. This is an example of what kind of attack?

    A. Reverse Psychology

    B. Social Engineering

    C. Reverse Engineering

    D. Spoofing Identity

    E. Faking Identity

  • Question 305:

    Jack Hacker wants to break into company's computers and obtain their secret double fudge cookie recipe. Jacks calls Jane, an accountant at company pretending to be an administrator from company. Jack tells Jane that there has been a problem with some accounts and asks her to verify her password with him "just to double check our records". Jane does not suspect anything amiss, and parts with her password. Jack can now access company's computers with a valid user name and password, to steal the cookie recipe.

    What kind of attack is being illustrated here? (Choose the best answer)

    A. Reverse Psychology

    B. Reverse Engineering

    C. Social Engineering

    D. Spoofing Identity

    E. Faking Identity

  • Question 306:

    What is the most common vehicle for social engineering attacks?

    A. Phone

    B. Email

    C. In person

    D. P2P Networks

  • Question 307:

    Why is Social Engineering considered attractive by hackers and also adopted by experts in the field?

    A. It is done by well known hackers and in movies as well.

    B. It does not require a computer in order to commit a crime.

    C. It is easy and extremely effective to gain information.

    D. It is not considered illegal.

  • Question 308:

    Your boss at ABC.com asks you what are the three stages of Reverse Social Engineering.

    A. Sabotage, advertising, Assisting

    B. Sabotage, Advertising, Covering

    C. Sabotage, Assisting, Billing

    D. Sabotage, Advertising, Covering

  • Question 309:

    After a client sends a connection request (SYN) packet to the server, the server will respond (SYN- ACK) with a sequence number of its choosing, which then must be acknowledge (ACK) by the client. This sequence number is predictable; the attack connects to a service first with its own IP address, records the sequence number chosen and then opens a second connection from a forget IP address. The attack doesn't see the SYN-ACK (or any other packet) from the server, but can guess the correct responses. If the source IP Address is used for authentication, the attacker can use the one-side communication to break into the server.

    What attacks can you successfully launch against a server using the above technique?

    A. Session Hijacking attacks

    B. Denial of Service attacks

    C. Web Page defacement attacks

    D. IP Spoofing Attacks

  • Question 310:

    Which of the following attacks takes best advantage of an existing authenticated connection

    A. Spoofing

    B. Session Hijacking

    C. Password Sniffing

    D. Password Guessing

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.