Exam Details

  • Exam Code
    :312-50
  • Exam Name
    :Certified Ethical Hacker
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :614 Q&As
  • Last Updated
    :Apr 16, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50 Questions & Answers

  • Question 541:

    An attacker runs netcat tool to transfer a secret file between two hosts.

    Machine A: netcat -1 p 1234 < secretfile

    Machine B: netcat 192.168.3.4 > 1234

    He is worried about information being sniffed on the network.

    How would the attacker use netcat to encrypt information before transmitting it on the wire?

    A. Machine A: netcat -1 p s password 1234 < testfileMachine B: netcat 1234

    B. Machine A: netcat -1 e magickey p 1234 < testfileMachine B: netcat 1234

    C. Machine A: netcat -1 p 1234 < testfile pw passwordMachine B: netcat 1234 pw password

    D. Use cryptcat instead of netcat.

  • Question 542:

    Jane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried that adversaries might be monitoring the communication link and could inspect captured traffic. She would line to tunnel the information to the remote end but does not have VPN capabilities to do so.

    Which of the following tools can she use to protect the link?

    A. MD5

    B. SSH

    C. RSA

    D. PGP

  • Question 543:

    You just purchased the latest DELL computer, which comes pre-installed with Windows XP, McAfee antivirus software and a host of other applications. You want to connect Ethernet wire to your cable modem and start using the computer immediately.

    Windows is dangerously insecure when unpacked from the box, and there are a few things that you must do before you use it.

    A. New Installation of Windows Should be patched by installation the latest service packs and hotfixes

    B. Enable "guest" account

    C. Install a personal firewall and lock down unused ports from connecting to your computer

    D. Install the latest signatures for Antivirus software

    E. Configure "Windows Update" to automatic

    F. Create a non-admin user with a complex password and login to this account

  • Question 544:

    Jim was having no luck performing a penetration test on his company's network. He was running the test from home and had downloaded every security scanner he could lay his hands on. Despite knowing the IP range of all of the systems and the exact network configuration, Jim was unable to get any useful results. Why is Jim having these problems?

    A. Security scanners can't perform vulnerability linkage

    B. Security Scanners are not designed to do testing through a firewall

    C. Security Scanners are only as smart as their database and can't find unpublished vulnerabilities

    D. All of the above

  • Question 545:

    Which type of attack is port scanning?

    A. Web server attack

    B. Information gathering

    C. Unauthorized access

    D. Denial of service attack

  • Question 546:

    Oregon Corp is fighting a litigation suit with Scamster Inc. Oregon has assigned a private investigative agency to go through garbage, recycled paper, and other rubbish at Scamster's office site in order to find relevant information. What would you call this kind of activity?

    A. Garbage Scooping

    B. Dumpster Diving

    C. Scanning

    D. CI Gathering

  • Question 547:

    Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?

    A. To determine who is the holder of the root account

    B. To perform a DoS

    C. To create needless SPAM

    D. To illicit a response back that will reveal information about email servers and how they treat undeliverable mail

    E. To test for virus protection

  • Question 548:

    In which of the following should be performed first in any penetration test?

    A. System identification

    B. Intrusion Detection System testing

    C. Passive information gathering

    D. Firewall testing

  • Question 549:

    Vulnerability mapping occurs after which phase of a penetration test?

    A. Host scanning

    B. Passive information gathering

    C. Analysis of host scanning

    D. Network level discovery

  • Question 550:

    A client has approached you with a penetration test requirements. They are concerned with the possibility of external threat, and have invested considerable resources in protecting their Internet exposure. However, their main concern is the possibility of an employee elevating his/her privileges and gaining access to information outside of their respective department.

    What kind of penetration test would you recommend that would best address the client's concern?

    A. A Black Box test

    B. A Black Hat test

    C. A Grey Box test

    D. A Grey Hat test

    E. A White Box test

    F. A White Hat test

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.