Your success in EC-Council 312-50 is our sole target and we develop all our 312-50 braindumps in a way that facilitates the attainment of this target. Not only is our 312-50 study material the best you can find, it is also the most detailed and the most updated. 312-50 Practice Exams for EC-Council 312-50 are written to the highest standards of technical accuracy.

Q21. You want to capture Facebook website traffic in Wireshark. What display filter should you use that shows all TCP packets that contain the word 'facebook'? 

A. display==facebook 

B. traffic.content==facebook 

C. tcp contains facebook 

D. list.display.facebook 

Answer: C


Q22. Under what conditions does a secondary name server request a zone transfer from a primary name server? 

A. When a primary SOA is higher that a secondary SOA 

B. When a secondary SOA is higher that a primary SOA 

C. When a primary name server has had its service restarted 

D. When a secondary name server has had its service restarted 

E. When the TTL falls to zero 

Answer: A

Explanation: Understanding DNS is critical to meeting the requirements of the CEH. When the serial number that is within the SOA record of the primary server is higher than the Serial number within the SOA record of the secondary DNS server, a zone transfer will take place. 


Q23. Blane is a security analyst for a law firm. One of the lawyers needs to send out an email to a client but he wants to know if the email is forwarded on to any other recipients. The client is explicitly asked not to re-send the email since that would be a violation of the lawyer's and client's agreement for this particular case. What can Blane use to accomplish this? 

A. He can use a split-DNS service to ensure the email is not forwarded on. 

B. A service such as HTTrack would accomplish this. 

C. Blane could use MetaGoofil tracking tool. 

D. Blane can use a service such as ReadNotify tracking tool. 

Answer: D


Q24. What type of encryption does WPA2 use? 

A. DES 64 bit 

B. AES-CCMP 128 bit 

C. MD5 48 bit 

D. SHA 160 bit 

Answer: B


Q25. Exhibit: 

Given the following extract from the snort log on a honeypot, what service is being exploited? : 

A. FTP 

B. SSH 

C. Telnet 

D. SMTP 

Answer:

Explanation: The connection is done to 172.16.1.104:21. 


Q26. Anonymizer sites access the Internet on your behalf, protecting your personal information from disclosure. An anonymizer protects all of your computer's identifying information while it surfs for you, enabling you to remain at least one step removed from the sites you visit. 

You can visit Web sites without allowing anyone to gather information on sites visited by you. Services that provide anonymity disable pop-up windows and cookies, and conceal visitor's IP address. 

These services typically use a proxy server to process each HTTP request. When the user requests a Web page by clicking a hyperlink or typing a URL into their browser, the service retrieves and displays the information using its own server. The remote server (where the requested Web page resides) receives information on the anonymous Web surfing service in place of your information. 

In which situations would you want to use anonymizer? (Select 3 answers) 

A. Increase your Web browsing bandwidth speed by using Anonymizer 

B. To protect your privacy and Identity on the Internet 

C. To bypass blocking applications that would prevent access to Web sites or parts of sites that you want to visit. 

D. Post negative entries in blogs without revealing your IP identity 

Answer: BCD


Q27. Which of the following represent weak password? (Select 2 answers) 

A. Passwords that contain letters, special characters, and numbers Example: ap1$%##f@52 

B. Passwords that contain only numbers Example: 23698217 

C. Passwords that contain only special characters Example: &*#@!(%) 

D. Passwords that contain letters and numbers Example: meerdfget123 

E. Passwords that contain only letters Example: QWERTYKLRTY 

F. Passwords that contain only special characters and numbers Example: 123@$45 

G. Passwords that contain only letters and special characters Example: bob@&ba 

H. Passwords that contain Uppercase/Lowercase from a dictionary list Example: OrAnGe 

Answer: EH


Q28. 802.11b is considered a ____________ protocol. 

A. Connectionless 

B. Secure 

C. Unsecure 

D. Token ring based 

E. Unreliable 

Answer: C

Explanation: 802.11b is an insecure protocol. It has many weaknesses that can be used by a hacker. 


Q29. Which of the following activities will NOT be considered as passive footprinting? 

A. Go through the rubbish to find out any information that might have been discarded. 

B. Search on financial site such as Yahoo Financial to identify assets. 

C. Scan the range of IP address found in the target DNS database. 

D. Perform multiples queries using a search engine. 

Answer: C

Explanation: Passive footprinting is a method in which the attacker never makes contact with the target systems. Scanning the range of IP addresses found in the target DNS is considered making contact to the systems behind the IP addresses that is targeted by the scan. 


Q30. War dialing is one of the oldest methods of gaining unauthorized access to the target systems, it is one of the dangers most commonly forgotten by network engineers and system administrators. A hacker can sneak past all the expensive firewalls and IDS and connect easily into the network. Through wardialing an attacker searches for the devices located in the target network infrastructure that are also accessible through the telephone line. 

‘Dial backup’ in routers is most frequently found in networks where redundancy is required. Dial-on-demand routing(DDR) is commonly used to establish connectivity as a backup. 

As a security testers, how would you discover what telephone numbers to dial-in to the router? 

A. Search the Internet for leakage for target company’s telephone number to dial-in 

B. Run a war-dialing tool with range of phone numbers and look for CONNECT Response 

C. Connect using ISP’s remote-dial in number since the company’s router has a leased line connection established with them 

D. Brute force the company’s PABX system to retrieve the range of telephone numbers to dial-in 

Answer:

Explanation: Use a program like Toneloc to scan the company’s range of phone numbers.