Exam Details

  • Exam Code
    :312-50V8
  • Exam Name
    :Certified Ethical Hacker v8
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :1008 Q&As
  • Last Updated
    :Apr 15, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V8 Questions & Answers

  • Question 391:

    One advantage of an application-level firewall is the ability to

    A. filter packets at the network level.

    B. filter specific commands,such as http:post.

    C. retain state information for each packet.

    D. monitor tcp handshaking.

  • Question 392:

    Which results will be returned with the following Google search query? site:target.com -site:Marketing.target.com accounting

    A. Results matching all words in the query

    B. Results matching "accounting" in domain target.com but not on the site Marketing.target.com

    C. Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting

    D. Results for matches on target.com and Marketing.target.com that include the word "accounting"

  • Question 393:

    Which of the following settings enables Nessus to detect when it is sending too many packets and the network pipe is approaching capacity?

    A. Netstat WMI Scan

    B. Silent Dependencies

    C. Consider unscanned ports as closed

    D. Reduce parallel connections on congestion

  • Question 394:

    Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process. Which of the following is the correct bit size of the Diffie-Hellman (DH) group 5?

    A. 768 bit key

    B. 1025 bit key

    C. 1536 bit key

    D. 2048 bit key

  • Question 395:

    Which type of intrusion detection system can monitor and alert on attacks, but cannot stop them?

    A. Detective

    B. Passive

    C. Intuitive

    D. Reactive

  • Question 396:

    The following is part of a log file taken from the machine on the network with the IP address of

    192.168.1.106:

    Time:Mar 13 17:30:15 Port:20 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

    Time:Mar 13 17:30:17 Port:21 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP Time:Mar 13 17:30:19 Port:22 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

    Time:Mar 13 17:30:21 Port:23 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

    Time:Mar 13 17:30:22 Port:25 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

    Time:Mar 13 17:30:23 Port:80 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

    Time:Mar 13 17:30:30 Port:443 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

    What type of activity has been logged?

    A. Port scan targeting 192.168.1.103

    B. Teardrop attack targeting 192.168.1.106

    C. Denial of service attack targeting 192.168.1.103

    D. Port scan targeting 192.168.1.106

  • Question 397:

    A network administrator received an administrative alert at 3:00 a.m. from the intrusion detection system. The alert was generated because a large number of packets were coming into the network over ports 20 and 21. During analysis, there were no signs of attack on the FTP servers.

    How should the administrator classify this situation?

    A. True negatives

    B. False negatives

    C. True positives

    D. False positives

  • Question 398:

    Which solution can be used to emulate computer services, such as mail and ftp, and to capture information related to logins or actions?

    A. Firewall

    B. Honeypot

    C. Core server

    D. Layer 4 switch

  • Question 399:

    International Organization for Standardization (ISO) standard 27002 provides guidance for compliance by outlining

    A. guidelines and practices for security controls.

    B. financial soundness and business viability metrics.

    C. standard best practice for configuration management.

    D. contract agreement writing standards.

  • Question 400:

    A hacker was able to sniff packets on a company's wireless network. The following information was discovereD. The Key 10110010 01001011 The Cyphertext 01100101 01011010 Using the Exlcusive OR, what was the original message?

    A. 00101000 11101110

    B. 11010111 00010001

    C. 00001101 10100100

    D. 11110010 01011011

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V8 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.