Exam Details

  • Exam Code
    :312-50
  • Exam Name
    :Certified Ethical Hacker
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :614 Q&As
  • Last Updated
    :Apr 16, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50 Questions & Answers

  • Question 421:

    What does the this symbol mean?

    A. Open Access Point

    B. WPA Encrypted Access Point

    C. WEP Encrypted Access Point

    D. Closed Access Point

  • Question 422:

    Which of the following keyloggers can't be detected by anti-virus or anti-spyware products?

    A. Hardware keylogger

    B. Software Keylogger

    C. Stealth Keylogger

    D. Convert Keylogger

  • Question 423:

    Joseph has just been hired on to a contractor company of the Department of Defense as their senior Security Analyst. Joseph has been instructed on the Company's strict security policies that have been implemented and the policies that have yet to be put in place. Per the Department of Defense, all DoD users and the users of their contractors must use two-factor authentication to access their networks. Joseph has been delegated the task of researching and implementing the best two-factor authentication method for his company. Joseph's supervisor has told him that they would like to use some type of hardware device in tandem with a security or identifying pin number.

    Joseph's company has already researched using smart cards and all the resources needed to implement them, but found the smart cards to not be cost effective. What type of device should Joseph use for two-factor authentication?

    A. Security token

    B. Biometric device

    C. OTP

    D. Proximity cards

  • Question 424:

    You are trying to compromise a Linux Machine and steal the password hashes for cracking with password brute forcing program. Where is the password file kept is Linux?

    A. /etc/shadow

    B. /etc/passwd

    C. /bin/password

    D. /bin/shadow

  • Question 425:

    Bob is a Junior Administrator at ABC Company. On One of Linux machine he entered the following firewall rules:

    iptables t filter A INPUT -p tcp --dport 23 j DROP

    Why he entered the above line?

    A. To accept the Telnet connection

    B. To deny the Telnet connection

    C. The accept all connection except telnet connection

    D. None of Above

  • Question 426:

    Jim's Organization just completed a major Linux roll out and now all of the organization's systems are running Linux 2.5 Kernel. The roll out expenses has posed constraints on purchasing other essential security equipment and software. The organization requires an option to control network traffic and also perform stateful inspection of traffic going into and out of the DMZ, which built-in functionality of Linux can achieve this?

    A. IP ICMP

    B. IP Sniffer

    C. IP tables

    D. IP Chains

  • Question 427:

    Peter is a Linux network admin. As a knowledgeable security consultant, he turns to you to look for help on a firewall. He wants to use Linux as his firewall and use the latest freely available version that is offered. What do you recommend? Select the best answer.

    A. Ipchains

    B. Iptables

    C. Checkpoint FW for Linux

    D. Ipfwadm

  • Question 428:

    On a backdoored Linux box there is a possibility that legitimate programs are modified or trojaned. How is it possible to list processes and uids associated with them in a more reliable manner?

    A. Use "Is"

    B. Use "lsof"

    C. Use "echo"

    D. Use "netstat"

  • Question 429:

    Clive is conducting a pen-test and has just port scanned a system on the network. He has identified the operating system as Linux and been able to elicit responses from ports 23, 25 and 53. He infers port 23 as running Telnet service, port 25 as running SMTP service and port 53 as running DNS service. The client confirms these findings and attests to the current availability of the services. When he tries to telnet to port 23 or 25, he gets a blank screen in response. On typing other commands, he sees only blank spaces or underscores symbols on the screen. What are you most likely to infer from this?

    A. The services are protected by TCP wrappers

    B. There is a honeypot running on the scanned machine

    C. An attacker has replaced the services with trojaned ones

    D. This indicates that the telnet and SMTP server have crashed

  • Question 430:

    After studying the following log entries, what is the attacker ultimately trying to achieve as inferred from the log sequence?

    1.

    mkdir -p /etc/X11/applnk/Internet/.etc

    2.

    mkdir -p /etc/X11/applnk/Internet/.etcpasswd

    3.

    touch -acmr /etc/passwd /etc/X11/applnk/Internet/.etcpasswd

    4.

    touch -acmr /etc /etc/X11/applnk/Internet/.etc

    5.

    passwd nobody -d

    6.

    /usr/sbin/adduser dns -d/bin -u 0 -g 0 -s/bin/bash

    7.

    passwd dns -d

    8.

    touch -acmr /etc/X11/applnk/Internet/.etcpasswd /etc/passwd

    9.

    touch -acmr /etc/X11/applnk/Internet/.etc /etc

    A. Change password of user nobody

    B. Extract information from a local directory

    C. Change the files Modification Access Creation times

    D. Download rootkits and passwords into a new directory

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.