Exam Details

  • Exam Code
    :312-50
  • Exam Name
    :Certified Ethical Hacker
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :614 Q&As
  • Last Updated
    :Mar 29, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50 Questions & Answers

  • Question 721:

    TCP/IP Session Hijacking is carried out in which OSI layer?

    A. Transport layer

    B. Datalink layer

    C. Physical Layer

    D. Network Layer

  • Question 722:

    Reflective DDoS attacks do not send traffic directly at the targeted host. Instead, they usually spoof the originating IP addresses and send the requests at the reflectors. These reflectors (usually routers or high-powered servers with a large amount of network resources at their disposal) then reply to the spoofed targeted traffic by sending loads and loads of data to the final target.

    How would you detect these reflectors on your network?

    A. Run floodnet tool to detect these reflectors

    B. Look for the banner text by running Zobbie Zappers tools

    C. Run Vulnerability scanner on your network to detect these reflectors

    D. Scan the network using Nmap for the services used by these reflectors

  • Question 723:

    Leonard is a systems administrator who has been tasked by his supervisor to slow down or lessen the amount of SPAM their company receives on a regular basis. SPAM being sent to company email addresses has become a large problem within the last year for them. Leonard starts by adding SPAM prevention software at the perimeter of the network. He then builds a black list, white list, turns on MX callbacks, and uses heuristics to stop the incoming SPAM. While these techniques help some, they do not prevent much of the SPAM from coming in. Leonard decides to use a technique where his mail server responds very slowly to outside connected mail servers by using multi-line SMTP responses. By responding slowly to SMTP connections, he hopes that SPAMMERS will see this and move on to easier and faster targets.

    What technique is Leonard trying to employ here to stop SPAM?

    A. To stop SPAM, Leonard is using the technique called Bayesian Content Filtering

    B. Leonard is trying to use the Transparent SMTP Proxy technique to stop incoming SPAM

    C. This technique that Leonard is trying is referred to as using a Sender Policy Framework to aid in SPAM prevention

    D. He is using the technique called teergrubing to delay SMTP responses and hopefully stop SPAM

  • Question 724:

    Jeffery works at a large financial firm in Dallas, Texas as a securities analyst. Last week, the IT department of his company installed a wireless network throughout the building. The problem is, is that they are only going to make it available to upper management and the IT department.

    Most employees don't have a problem with this since they have no need for wireless networking, but Jeffery would really like to use wireless since he has a personal laptop that he works from as much as he can. Jeffery asks the IT manager if he could be allowed to use the wireless network but he is turned down. Jeffery is not satisfied, so he brings his laptop in to work late one night and tries to get access to the network. Jeffery uses the wireless utility on his laptop, but cannot see any wireless networks available. After about an hour of trying to figure it out, Jeffery cannot get on the company's wireless network. Discouraged, Jeffery leaves the office and goes home.

    The next day, Jeffery calls his friend who works with computers. His friend suggests that his IT department might have turned off SSID broadcasting, and that is why he could not see any wireless networks. How would Jeffrey access the wireless network?

    A. Run WEPCrack tool and brute force the SSID hashes

    B. Jam the wireless signal by launching denial of service attack

    C. Sniff the wireless network and capture the SSID that is transmitted over the wire in plaintext

    D. Attempt to connect using wireless device default SSIDs

  • Question 725:

    Jason works in the sales and marketing department for a very large advertising agency located in Atlanta. Jason is working on a very important marketing campaign for his company's largest client. Before the project could be completed and implemented, a competing advertising company comes out with the exact same marketing materials and advertising, thus rendering all the work done for Jason's client unusable. Jason is questioned about this and says he has no idea how all the material ended up in the hands of a competitor.

    Without any proof, Jason's company cannot do anything except move on. After working on another high profile client for about a month, all the marketing and sales material again ends up in the hands of another competitor and is released to the public before Jason's company can finish the project. Once again, Jason says that he had nothing to do with it and does not know how this could have happened. Jason is given leave with pay until they can figure out what is going on.

    Jason's supervisor decides to go through his email and finds a number of emails that were sent to the competitors that ended up with the marketing material. The only items in the emails were attached jpg files, but nothing else. Jason's supervisor opens the picture files, but cannot find anything out of the ordinary with them.

    What technique has Jason most likely used?

    A. Stealth Rootkit Technique

    B. Snow Hiding Technique

    C. ADS Streams Technique

    D. Image Steganography Technique

  • Question 726:

    WWW wanderers or spiders are programs that traverse many pages in the World Wide Web by recursively retrieving linked pages. Search engines like Google, frequently spider web pages for indexing. How will you stop web spiders from crawling certain directories on your website?

    A. Place robots.txt file in the root of your website with listing of directories that you don't want to be crawled

    B. Place authentication on root directories that will prevent crawling from these spiders

    C. Place "HTTP:NO CRAWL" on the html pages that you don't want the crawlers to index

    D. Enable SSL on the restricted directories which will block these spiders from crawling

  • Question 727:

    Gerald is a Certified Ethical Hacker working for a large financial institution in Oklahoma City. Gerald is currently performing an annual security audit of the company's network. One of the company's primary concerns is how the corporate data is transferred back and forth from the banks all over the city to the data warehouse at the company's home office. To see what type of traffic is being passed back and forth and to see how secure that data really is, Gerald uses a session hijacking tool to intercept traffic between a server and a client. Gerald hijacks an HTML session between a client running a web application which connects to a SQL database at the home office. Gerald does not kill the client's session; he simply monitors the traffic that passes between it and the server.

    What type of session attack is Gerald employing here?

    A. He is utilizing a passive network level hijack to see the session traffic used to communicate between the two devices

    B. Gerald is using a passive application level hijack to monitor the client and server traffic

    C. This type of attack would be considered an active application attack since he is actively monitoring the traffic

    D. This type of hijacking attack is called an active network attack

  • Question 728:

    You are configuring the security options of your mail server and you would like to block certain file attachments to prevent viruses and malware from entering the users inbox.

    Which of the following file formats will you block?

    (Select up to 6)

    A. .txt

    B. .vbs

    C. .pif

    D. .jpg

    E. .gif

    F. .com

    G. .htm

    H. .rar

    I. .scr

    J. .exe

  • Question 729:

    Darren is the network administrator for Greyson and Associates, a large law firm in Houston. Darren is responsible for all network functions as well as any digital forensics work that is needed. Darren is examining the firewall logs one morning and notices some unusual activity. He traces the activity target to one of the firm's internal file servers and finds that many documents on that server were destroyed. After performing some calculations, Darren finds the damage to be around $75,000 worth of lost data. Darren decides that this incident should be handled and resolved within the same day of its discovery.

    What incident level would this situation be classified as?

    A. This situation would be classified as a mid-level incident

    B. Since there was over $50,000 worth of loss, this would be considered a high-level incident

    C. Because Darren has determined that this issue needs to be addressed in the same day it was discovered, this would be considered a low-level incident

    D. This specific incident would be labeled as an immediate-level incident

  • Question 730:

    This is an authentication method in which is used to prove that a party knows a password without transmitting the password in any recoverable form over a network. This authentication is secure because the password is never transmitted over the network, even in hashed form; only a random number and an encrypted random number are sent.

    A. Realm Authentication

    B. SSL Authentication

    C. Basic Form Authentication

    D. Cryptographic Authentication

    E. Challenge/Response Authentication

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.