EC-Council 312-50 exam certification is the dream of every one of the IT aspirants. Should you be a work hunter who are also eager to obtain the actual EC-Council EC-Council certificate. Please participate in Testkings on-line course. You will get a substantial mark that guarantee a wonderful success.

2021 Apr 312-50 exam guide

Q321. Data is sent over the network as clear text (unencrypted) when Basic Authentication is configured on Web Servers. 

A. True 

B. False 

Answer: A

Explanation: Using HTTP basic authentication will result in your password being sent over the internet as clear text. Don't use this technique unless you understand what the ramifications of this are. 


Q322. You have just installed a new Linux file server at your office. This server is going to be used by several individuals in the organization, and unauthorized personnel must not be able to modify any data. 

What kind of program can you use to track changes to files on the server? 

A. Network Based IDS (NIDS) 

B. Personal Firewall 

C. System Integrity Verifier (SIV) 

D. Linux IP Chains 

Answer: C

Explanation: System Integrity Verifiers like Tripwire aids system administrators and users in monitoring a designated set of files for any changes. Used with system files on a regular (e.g., daily) basis, Tripwire can notify system administrators of corrupted or tampered files, so damage control measures can be taken in a timely manner. 


Q323. Bill has started to notice some slowness on his network when trying to update his company’s website while trying to access the website from the Internet. Bill asks the help desk manager if he has received any calls about slowness from the end users, but the help desk manager says that he has not. Bill receives a number of calls from customers that can’t access the company website and can’t purchase anything online. Bill logs on to a couple of this routers and notices that the logs shows network traffic is at all time high. He also notices that almost all the traffic is originating from a specific address. 

Bill decides to use Geotrace to find out where the suspect IP is originates from. The Geotrace utility runs a traceroute and finds that IP is coming from Panama. Bill knows that none of his customers are in Panama so he immediately thinks that his company is under a Denial of Service attack. Now Bill needs to find out more about the originating IP Address. 

What Internet registry should Bill look in to find the IP Address? 

A. LACNIC 

B. ARIN 

C. RIPELACNIC 

D. APNIC 

Answer: A

Explanation: LACNIC is the Latin American and Caribbean Internet Addresses Registry that administers IP addresses, autonomous system numbers, reverse DNS, and other network resources for that region. 


Q324. Which of the following statements about a zone transfer correct?(Choose three. 

A. A zone transfer is accomplished with the DNS 

B. A zone transfer is accomplished with the nslookup service 

C. A zone transfer passes all zone information that a DNS server maintains 

D. A zone transfer passes all zone information that a nslookup server maintains 

E. A zone transfer can be prevented by blocking all inbound TCP port 53 connections 

F. Zone transfers cannot occur on the Internet 

Answer: ACE

Explanation: Securing DNS servers should be a priority of the organization. Hackers obtaining DNS information can discover a wealth of information about an organization. This information can be used to further exploit the network. 


Q325. Which address translation scheme would allow a single public IP address to always correspond to a single machine on an internal network, allowing "server publishing"? 

A. Overloading Port Address Translation 

B. Dynamic Port Address Translation 

C. Dynamic Network Address Translation 

D. Static Network Address Translation 

Answer: D

Explanation: Mapping an unregistered IP address to a registered IP address on a one-to-one basis. Particularly useful when a device needs to be accessible from outside the network. 


Renew 312-50 free draindumps:

Q326. Which of the following activities would not be considered passive footprinting? 

A. Search on financial site such as Yahoo Financial 

B. Perform multiple queries through a search engine 

C. Scan the range of IP address found in their DNS database 

D. Go through the rubbish to find out any information that might have been discarded 

Answer: C

Explanation: Passive footprinting is a method in which the attacker never makes contact with the target. Scanning the targets IP addresses can be logged at the target and therefore contact has been made. 


Q327. Jane has just accessed her preferred e-commerce web site and she has seen an item she would like to buy. Jane considers the price a bit too steep; she looks at the page source code and decides to save the page locally to modify some of the page variables. In the context of web application security, what do you think Jane has changed? 

A. An integer variable 

B. A 'hidden' price value 

C. A 'hidden' form field value 

D. A page cannot be changed locally; it can only be served by a web server 

Answer: C

Explanation: Changing hidden form values is possible when a web site is poorly built and is trusting the visitors computer to submit vital data, like the price of a product, to the database. 


Q328. Jason is the network administrator of Spears Technology. He has enabled SNORT IDS to detect attacks going through his network. He receives Snort SMS alerts on his iPhone whenever there is an attempted intrusion to his network. 

He receives the following SMS message during the weekend. 

An attacker Chew Siew sitting in Beijing, China had just launched a remote scan on Jason's network with the hping command. 

Which of the following hping2 command is responsible for the above snort alert? 

A. chenrocks:/home/siew # hping -S -R -P -A -F -U 192.168.2.56 -p 22 -c 5 -t 118 

B. chenrocks:/home/siew # hping -F -Q -J -A -C -W 192.168.2.56 -p 22 -c 5 -t 118 

C. chenrocks:/home/siew # hping -D -V -R -S -Z -Y 192.168.2.56 -p 22 -c 5 -t 118 

D. chenrocks:/home/siew # hping -G -T -H -S -L -W 192.168.2.56 -p 22 -c 5 -t 118 

Answer: A


Q329. Steven the hacker realizes that the network administrator of company is using syskey to protect organization resources in the Windows 2000 Server. Syskey independently encrypts the hashes so that physical access to the server, tapes, or ERDs is only first step to cracking the passwords. Steven must break through the encryption used by syskey before he can attempt to brute force dictionary attacks on the hashes. Steven runs a program called “SysCracker” targeting the Windows 2000 Server machine in attempting to crack the hash used by Syskey. He needs to configure the encryption level before he can launch attach. 

How many bits does Syskey use for encryption? 

A. 40 bit 

B. 64 bit 

C. 256 bit 

D. 128 bit 

Answer: D

Explanation: SYSKEY is a utility that encrypts the hashed password information in a SAM database using a 128-bit encryption key. 


Q330. A distributed port scan operates by: 

A. Blocking access to the scanning clients by the targeted host 

B. Using denial-of-service software against a range of TCP ports 

C. Blocking access to the targeted host by each of the distributed scanning clients 

D. Having multiple computers each scan a small number of ports, then correlating the results 

Answer: D

Explanation: Think of dDoS (distributed Denial of Service) where you use a large number of computers to create simultaneous traffic against a victim in order to shut them down.