Exam Code: 312-50 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Ethical Hacking and Countermeasures (CEHv6)
Certification Provider: EC-Council
Free Today! Guaranteed Training- Pass 312-50 Exam.

Q331. Neil is closely monitoring his firewall rules and logs on a regular basis. Some of the users have complained to Neil that there are a few employees who are visiting offensive web site during work hours, without any consideration for others. Neil knows that he has an up-to-date content filtering system and such access should not be authorized. What type of technique might be used by these offenders to access the Internet without restriction? 

A. They are using UDP that is always authorized at the firewall 

B. They are using HTTP tunneling software that allows them to communicate with protocols in a way it was not intended 

C. They have been able to compromise the firewall, modify the rules, and give themselves proper access 

D. They are using an older version of Internet Explorer that allow them to bypass the proxy server 

Answer: B


Q332. Attackers footprint target Websites using Google Hacking techniques. Google hacking is a term that refers to the art of creating complex search engine queries. It detects websites that are vulnerable to numerous exploits and vulnerabilities. Google operators are used to locate specific strings of text within the search results. 

The configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database. WordPress uses config.php that stores the database Username and Password. 

Which of the below Google search string brings up sites with "config.php" files? 

A. Search:index config/php 

B. Wordpress:index config.php 

C. intitle:index.of config.php 

D. Config.php:index list 

Answer: C


Q333. What did the following commands determine? 

C : user2sid \earth guest S-1-5-21-343818398-789336058-1343024091-501 

C:sid2user 5 21 343818398 789336058 1343024091 500 Name is Joe Domain is EARTH 

A. That the Joe account has a SID of 500 

B. These commands demonstrate that the guest account has NOT been disabled 

C. These commands demonstrate that the guest account has been disabled 

D. That the true administrator is Joe 

E. Issued alone, these commands prove nothing 

Answer: D

Explanation: One important goal of enumeration is to determine who the true administrator is. In the example above, the true administrator is Joe. 


Q334. You ping a target IP to check if the host is up. You do not get a response. You suspect ICMP is blocked at the firewall. Next you use hping2 tool to ping the target host and you get a response. Why does the host respond to hping2 and not ping packet? 

[ceh]# ping 10.2.3.4 

PING 10.2.3.4 (10.2.3.4) from 10.2.3.80 : 56(84) bytes of data. 

--- 10.2.3.4 ping statistics ---

3 packets transmitted, 0 packets received, 100% packet loss 

[ceh]# ./hping2 -c 4 -n -i 2 10.2.3.4 

HPING 10.2.3.4 (eth0 10.2.3.4): NO FLAGS are set, 40 headers + 

0 data bytes 

len=46 ip=10.2.3.4 flags=RA seq=0 ttl=128 id=54167 win=0 rtt=0.8 ms 

len=46 ip=10.2.3.4 flags=RA seq=1 ttl=128 id=54935 win=0 rtt=0.7 ms 

len=46 ip=10.2.3.4 flags=RA seq=2 ttl=128 id=55447 win=0 rtt=0.7 ms 

len=46 ip=10.2.3.4 flags=RA seq=3 ttl=128 id=55959 win=0 rtt=0.7 ms 

--- 10.2.3.4 hping statistic ---

4 packets tramitted, 4 packets received, 0% packet loss 

round-trip min/avg/max = 0.7/0.8/0.8 ms 

A. ping packets cannot bypass firewalls 

B. you must use ping 10.2.3.4 switch 

C. hping2 uses TCP instead of ICMP by default 

D. hping2 uses stealth TCP packets to connect 

Answer: C

Explanation: Default protocol is TCP, by default hping2 will send tcp headers to target host's port 0 with a winsize of 64 without any tcp flag on. Often this is the best way to do an 'hide ping', useful when target is behind a firewall that drop ICMP. Moreover a tcp null-flag to port 0 has a good probability of not being logged. 


Q335. Destination unreachable administratively prohibited messages can inform the hacker to what? 

A. That a circuit level proxy has been installed and is filtering traffic 

B. That his/her scans are being blocked by a honeypot or jail 

C. That the packets are being malformed by the scanning software 

D. That a router or other packet-filtering device is blocking traffic 

E. That the network is functioning normally 

Answer: D

Explanation: Destination unreachable administratively prohibited messages are a good way to discover that a router or other low-level packet device is filtering traffic. Analysis of the ICMP message will reveal the IP address of the blocking device and the filtered port. This further adds the to the network map and information being discovered about the network and hosts. 


Q336. Syslog is a standard for logging program messages. It allows separation of the software that generates messages from the system that stores them and the software that reports and analyzes them. It also provides devices, which would otherwise be unable to communicate a means to notify administrators of problems or performance. 

What default port Syslog daemon listens on? 

A. 242 

B. 312 

C. 416 

D. 514 

Answer: D


Q337. The terrorist organizations are increasingly blocking all traffic from North America or from Internet Protocol addresses that point to users who rely on the English Language. 

Hackers sometimes set a number of criteria for accessing their website. This information is shared among the co-hackers. For example if you are using a machine with the Linux Operating System and the Netscape browser then you will have access to their website in a convert way. When federal investigators using PCs running windows and using Internet Explorer visited the hacker’s shared site, the hacker’s system immediately mounted a distributed denial-of-service attack against the federal system. 

Companies today are engaging in tracking competitor’s through reverse IP address lookup sites like whois.com, which provide an IP address’s domain. When the competitor visits the companies website they are directed to a products page without discount and prices are marked higher for their product. When normal users visit the website they are directed to a page with full-blown product details along with attractive discounts. This is based on IP-based blocking, where certain addresses are barred from accessing a site. 

What is this masking technique called? 

A. Website Cloaking 

B. Website Filtering 

C. IP Access Blockade 

D. Mirrored WebSite 

Answer: A

Explanation: Website Cloaking travels under a variety of alias including Stealth, Stealth scripts, IP delivery, Food Script, and Phantom page technology. It’s hot- due to its ability to manipulate those elusive top-ranking results from spider search engines. 


Q338. Take a look at the following attack on a Web Server using obstructed URL: 

http://www.example.com/script.ext?template%2e%2e%2e%2e%2e%2f%2e%2f%65%74%63%2f %70%61%73%73%77%64 

The request is made up of: 

-%2e%2e%2f%2e%2e%2f%2e%2f% = ../../../ 

-%65%74%63 = etc 

-%2f = / 

-%70%61%73%73%77%64 = passwd 

How would you protect information systems from these attacks? 

A. Configure Web Server to deny requests involving Unicode characters. 

B. Create rules in IDS to alert on strange Unicode requests. 

C. Use SSL authentication on Web Servers. 

D. Enable Active Scripts Detection at the firewall and routers. 

Answer: B

Explanation: This is a typical Unicode attack. By configuring your IDS to trigger on strange Unicode requests you can protect your web-server from this type of attacks. 


Q339. What does the this symbol mean? 

A. Open Access Point 

B. WPA Encrypted Access Point 

C. WEP Encrypted Access Point 

D. Closed Access Point 

Answer: A

Explanation: This symbol is a “warchalking” symbol for a open node (open circle) with the SSID tsunami and the bandwidth 2.0 Mb/s 


Q340. Samuel is the network administrator of DataX communications Inc. He is trying to configure his firewall to block password brute force attempts on his network. He enables blocking the intruder’s IP address for a period of 24 hours time after more than three unsuccessful attempts. He is confident that this rule will secure his network hackers on the Internet. 

But he still receives hundreds of thousands brute-force attempts generated from various IP addresses around the world. After some investigation he realizes that the intruders are using a proxy somewhere else on the Internet which has been scripted to enable the random usage of various proxies on each request so as not to get caught by the firewall use. 

Later he adds another rule to his firewall and enables small sleep on the password attempt so that if the password is incorrect, it would take 45 seconds to return to the user to begin another attempt. Since an intruder may use multiple machines to brute force the password, he also throttles the number of connections that will be prepared to accept from a particular IP address. This action will slow the intruder’s attempts. 

Samuel wants to completely block hackers brute force attempts on his network. 

What are the alternatives to defending against possible brute-force password attacks on his site? 

A. Enforce a password policy and use account lockouts after three wrong logon attempts even through this might lock out legit users 

B. Enable the IDS to monitor the intrusion attempts and alert you by e-mail about the IP address of the intruder so that you can block them at the firewall manually 

C. Enforce complex password policy on your network so that passwords are more difficult to brute force 

D. You can’t completely block the intruders attempt if they constantly switch proxies 

Answer: D

Explanation: Without knowing from where the next attack will come there is no way of proactively block the attack. This is becoming a increasing problem with the growth of large bot nets using ordinary workstations and home computers in large numbers.