Exam Details

  • Exam Code
    :312-50
  • Exam Name
    :Certified Ethical Hacker
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :614 Q&As
  • Last Updated
    :Mar 29, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50 Questions & Answers

  • Question 731:

    More sophisticated IDSs look for common shellcode signatures. But even these systems can be bypassed, by using polymorphic shellcode. This is a technique common among virus writers - it basically hides the true nature of the shellcode in different disguises.

    How does a polymorphic shellcode work?

    A. They convert the shellcode into Unicode, using loader to convert back to machine code then executing them

    B. They compress shellcode into normal instructions, uncompress the shellcode using loader code and then executing the shellcode

    C. They reverse the working instructions into opposite order by masking the IDS signatures

    D. They encrypt the shellcode by XORing values over the shellcode, using loader code to decrypt the shellcode, and then executing the decrypted shellcode

  • Question 732:

    Bob was frustrated with his competitor, Brownies Inc., and decided to launch an attack that would result in serious financial losses. He planned the attack carefully and carried out the attack at the appropriate moment. Meanwhile, Trent, an administrator at Brownies Inc., realized that their main financial transaction server had been attacked. As a result of the attack, the server crashed and Trent needed to reboot the system, as no one was able to access the resources of the company. This process involves human interaction to fix it. What kind of Denial of Service attack was best illustrated in the scenario above?

    A. DOS attacks which involves flooding a network or system

    B. DOS attacks which involves crashing a network or system

    C. DOS attacks which is done accidentally or deliberately

    D. Simple DDOS attack

  • Question 733:

    James is an IT security consultant as well as a certified ethical hacker. James has been asked to audit the network security of Yerta Manufacturing, a tool manufacturing company in Phoenix. James performs some initial external tests and then begins testing the security from inside the company's network.

    James finds some big problems right away; a number of users that are working on Windows XP computers have saved their usernames and passwords used to connect to servers on the network. This way, those users do not have to type in their credentials every time they want access to a server. James tells the IT manager of Yerta Manufacturing about this, and the manager does not believe this is possible on Windows XP. To prove his point, James has a user logon to a computer and then James types in a command that brings up a window that says "Stored User Names and Passwords".

    What command did James type in to get this window to come up?

    A. To bring up this stored user names and passwords window, James typed in "rundll32.exe storedpwd.dll, ShowWindow"

    B. James had to type in "rundll32.exe keymgr.dll, KRShowKeyMgr" to get the window to pop up

    C. James typed in the command "rundll32.exe storedpwd.dll" to get the Stored User Names and Passwords window to come up

    D. The command to bring up this window is "KRShowKeyMgr"

  • Question 734:

    Charlie is an IT security consultant that owns his own business in Denver. Charlie has recently been hired by Fleishman Robotics, a mechanical engineering company also in Denver. After signing service level agreements and other contract papers, Charlie asks to look over the current company security policies. Based on these policies, Charlie compares the policies against what is actually in place to secure the company's network. From this information, Charlie is able to produce a report to give to company executives showing which areas the company is lacking in. This report then becomes the basis for all of Charlie's remaining tests.

    What type of initial analysis has Charlie performed to show the company which areas it needs improvements in?

    A. Charlie has performed a BREACH analysis; showing the company where its weak points are

    B. This analysis would be considered a vulnerability analysis

    C. This type of analysis is called GAP analysis

    D. This initial analysis performed by Charlie is called an Executive Summary

  • Question 735:

    An SNMP scanner is a program that sends SNMP requests to multiple IP addresses, trying different community strings and waiting for a reply. Unfortunately SNMP servers don't respond to requests with invalid community strings and the underlying protocol does not reliably report closed ports. This means that 'no response' from the probed IP address can mean which of the following:

    (Select up to 3)

    A. Invalid community string

    B. S-AUTH protocol is running on the SNMP server

    C. Machine unreachable

    D. SNMP server not running

  • Question 736:

    Stephanie, a security analyst, has just returned from a Black Hat conference in Las Vegas where she learned of many powerful tools used by hackers and security professionals alike. Stephanie is primarily worried about her Windows network because of all the legacy computers and servers that she must use, due to lack of funding.

    Stephanie wrote down many of the tools she learned of in her notes and was particularly interested in one tool that could scan her network for vulnerabilities and return reports on her network's weak spots called SAINT. She remembered from her notes that SAINT is very flexible and can accomplish a number of tasks. Stephanie asks her supervisor, the CIO, if she can download and run SAINT on the network. Her boss said to not bother with it since it will not work for her at all.

    Why did Stephanie's boss say that SAINT would not work?

    A. SAINT only works on Macintosh-based machines

    B. SAINT is too expensive and is not cost effective

    C. SAINT is too network bandwidth intensive

    D. SAINT only works on LINUX and UNIX machines

  • Question 737:

    Giles is the network administrator for his company, a graphics design company based in Dallas. Most of the network is comprised of Windows servers and workstations, except for some designers that prefer to use MACs. These MAC users are running on the MAC OS X operating system. These MAC users also utilize iChat to talk between each other. Tommy, one of these MAC users, calls Giles and says that his computer is running very slow. Giles then gets more calls from the other MAC users saying they are receiving instant messages from Tommy even when he says he is not on his computer. Giles immediately unplugs Tommy's computer from the network to take a closer look. He opens iChat on Tommy's computer and it says that it sent a file called latestpics.tgz to all the other MAC users. Tommy says he never sent those files. Giles also sees that many of the computer's applications appear to be altered. The path where the files should be has an altered file and the original application is stored in the file's resource fork.

    What has Giles discovered on Tommy's computer?

    A. He has discovered OSX/Chat-burner virus on Tommy's computer

    B. Giles has found the OSX/Leap-A virus on Tommy's computer

    C. This behavior is indicative of the OSX/Inqtana.A virus

    D. On Tommy's computer, Giles has discovered an apparent infection of the OSX/Transmitter.B virus

  • Question 738:

    Justine is the systems administrator for her company, an international shipping company with offices all over the world. Recent US regulations have forced the company to implement stronger and more secure means of communication. Justine and other administrators have been put in charge of securing the company's digital communication lines. After implementing email encryption, Justine now needs to implement robust digital signatures to ensure data authenticity and reliability. Justine has decided to implement digital signatures which are a variant of DSA and that operate on elliptical curve groups. These signatures are more efficient than DSA and are not vulnerable to a number field sieve attacks.

    What type of signature has Justine decided to implement?

    A. She has decided to implement ElGamal signatures since they offer more reliability than the typical DSA signatures

    B. Justine has decided to use ECDSA signatures since they are more efficient than DSA signatures

    C. Justine is now utilizing SHA-1 with RSA signatures to help ensure data reliability

    D. These types of signatures that Justine has decided to use are called RSA-PSS signatures

  • Question 739:

    Stephanie works as a records clerk in a large office building in downtown Chicago. On Monday, she went to a mandatory security awareness class (Security5) put on by her company's IT department. During the class, the IT department informed all employees that everyone's Internet activity was thenceforth going to be monitored.

    Stephanie is worried that her Internet activity might give her supervisor reason to write her up, or worse get her fired. Stephanie's daily work duties only consume about four hours of her time, so she usually spends the rest of the day surfing the web. Stephanie really enjoys surfing the Internet but definitely does not want to get fired for it.

    What should Stephanie use so that she does not get in trouble for surfing the Internet?

    A. Cookie Disabler

    B. Stealth Anonymizer

    C. Stealth Firefox

    D. Stealth IE

  • Question 740:

    Theresa is the chief information security officer for her company, a large shipping company based out of New York City. In the past, Theresa and her IT employees manually checked the status of client computers on the network to see if they had the most recent Microsoft updates. Now that the company has added over 100 more clients to accommodate new departments, Theresa must find some kind of tool to see whether the clients are up-to-date or not. Theresa decides to use Qfecheck to monitor all client computers. When Theresa runs the tool, she is repeatedly told that the software does not have the proper permissions to scan. Theresa is worried that the operating system hardening that she performs on all clients is keeping the software from scanning the necessary registry keys on the client computers.

    What registry key permission should Theresa check to ensure that Qfecheck runs properly?

    A. In order for Qfecheck to run properly, it must have enough permission to read

    B. She needs to check the permissions of the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Updates registry key

    C. Theresa needs to look over the permissions of the registry key

    D. The registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Microsoft must be checked

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.