Assistance and after-sales support for all the customers For that introduction of EC-Council EC-Council exam, please click live chat. Pertaining to access to the downloadable materials, please contact our workers via email. For purchase or payment questions, please contact sales team. Pertaining to frequently asked questions, please seek support from FAQs in Examcollection.com. Pertaining to difficult troubles, please contact your online assist for immediate answers.

2021 Aug 312-50 exam engine

Q391. In this attack, a victim receives an e-mail claiming from PayPal stating that their account has been disabled and confirmation is required before activation. The attackers then scam to collect not one but two credit card numbers, ATM PIN number and other personal details. 


Ignorant users usually fall prey to this scam. Which of the following statement is incorrect related to this attack? 

A. Do not reply to email messages or popup ads asking for personal or financial information 

B. Do not trust telephone numbers in e-mails or popup ads 

C. Review credit card and bank account statements regularly 

D. Antivirus, anti-spyware, and firewall software can very easily detect these type of attacks 

E. Do not send credit card numbers, and personal or financial information via e-mail 

Answer: A


Q392. Sara is using the nslookup command to craft queries to list all DNS information (such as Name Servers, host names, MX records, CNAME records, glue records (delegation for child Domains), zone serial number, TimeToLive (TTL) records, etc) for a Domain. What do you think Sara is trying to accomplish? Select the best answer. 

A. A zone harvesting 

B. A zone transfer 

C. A zone update 

D. A zone estimate 

Answer: B

Explanation: The zone transfer is the method a secondary DNS server uses to update its information from the primary DNS server. DNS servers within a domain are organized using a master-slave method where the slaves get updated DNS information from the master DNS. One should configure the master DNS server to allow zone transfers only from secondary (slave) DNS servers but this is often not implemented. By connecting to a specific DNS server and successfully issuing the ls –d domain-name > file-name you have initiated a zone transfer. 


Q393. How would you describe an attack where an attacker attempts to deliver the payload over multiple packets over long periods of time with the purpose of defeating simple pattern matching in IDS systems without session reconstruction? A characteristic of this attack would be a continuous stream of small packets. 

A. Session Splicing 

B. Session Stealing 

C. Session Hijacking 

D. Session Fragmentation 

Answer: A


Q394. What type of attack changes its signature and/or payload to avoid detection by antivirus programs? 

A. Polymorphic 

B. Rootkit C. Boot sector 

D. File infecting 

Answer: A

Explanation: In computer terminology, polymorphic code is code that mutates while keeping the original algorithm intact. This technique is sometimes used by computer viruses, shellcodes and computer worms to hide their presence. 


Q395. Which of the following is NOT a reason 802.11 WEP encryption is vulnerable? 

A. There is no mutual authentication between wireless clients and access points 

B. Automated tools like AirSnort are available to discover WEP keys 

C. The standard does not provide for centralized key management 

D. The 24 bit Initialization Vector (IV) field is too small 

Answer: C

Explanation: The lack of centralized key management in itself is not a reason that the WEP encryption is vulnerable, it is the people setting the user shared key that makes it unsecure. 


312-50 free practice test

Update 312-50 answers:

Q396. This type of Port Scanning technique splits TCP header into several packets so that the packet filters are not able to detect what the packets intends to do. 

A. UDP Scanning 

B. IP Fragment Scanning 

C. Inverse TCP flag scanning 

D. ACK flag scanning 

Answer: B


Q397. You are the security administrator for a large network. You want to prevent attackers from running any sort of traceroute into your DMZ and discovering the internal structure of publicly accessible areas of the network. How can you achieve this? 

A. Block TCP at the firewall 

B. Block UDP at the firewall 

C. Block ICMP at the firewall 

D. There is no way to completely block tracerouting into this area 

Answer: D

Explanation: If you create rules that prevents attackers to perform traceroutes to your DMZ then you’ll also prevent anyone from accessing the DMZ from outside the company network and in that case it is not a DMZ you have. 


Q398. What is the purpose of firewalking? 

A. It's a technique used to discover Wireless network on foot 

B. It's a technique used to map routers on a network link 

C. It's a technique used to discover interface in promiscuous mode 

D. It's a technique used to discover what rules are configured on a gateway 

Answer: D

Explanation: Firewalking uses a traceroute-like IP packet analysis to determine whether or not a particular packet can pass from the attacker’s host to a destination host through a packet-filtering device. This technique can be used to map ‘open’ or ‘pass through’ ports on a gateway. More over, it can determine whether packets with various control information can pass through a given gateway. 


Q399. If you come across a sheepdip machaine at your client site, what would you infer? 

A. A sheepdip computer is used only for virus checking. 

B. A sheepdip computer is another name for honeypop. 

C. A sheepdip coordinates several honeypots. 

D. A sheepdip computer defers a denial of service attack. 

Answer: A

Explanation: Also known as a footbath, a sheepdip is the process of checking physical media, such as floppy disks or CD-ROMs, for viruses before they are used in a computer. Typically, a computer that sheepdips is used only for that process and nothing else and is isolated from the other computers, meaning it is not connected to the network. Most sheepdips use at least two different antivirus programs in order to increase effectiveness. 


Q400. Bill has successfully executed a buffer overflow against a Windows IIS web server. He has been able to spawn an interactive shell and plans to deface the main web page. He first attempts to use the "echo" command to simply overwrite index.html and remains unsuccessful. He then attempts to delete the page and achieves no progress. Finally, he tries to overwrite it with another page in which also he remains unsuccessful. What is the probable cause of Bill's problem? 

A. You cannot use a buffer overflow to deface a web page 

B. There is a problem with the shell and he needs to run the attack again 

C. The HTML file has permissions of read only 

D. The system is a honeypot 

Answer: C