Act now and download your EC-Council 312-50v8 test today! Do not waste time for the worthless EC-Council 312-50v8 tutorials. Download Refresh EC-Council Certified Ethical Hacker v8 exam with real questions and answers and begin to learn EC-Council 312-50v8 with a classic professional.

2021 Aug 312-50v8 book

Q151. Exhibit: 


You are conducting pen-test against a company’s website using SQL Injection techniques. You enter “anuthing or 1=1-“ in the username filed of an authentication form. This is the output returned from the server. 

What is the next step you should do? 

A. Identify the user context of the web application by running_ 

http://www.example.com/order/include_rsa_asp?pressReleaseID=5 

AND 

USER_NAME() = ‘dbo’ 

B. Identify the database and table name by running: 

http://www.example.com/order/include_rsa.asp?pressReleaseID=5 

AND 

ascii(lower(substring((SELECT TOP 1 name FROM sysobjects WHERE 

xtype=’U’),1))) > 109 

C. Format the C: drive and delete the database by running: 

http://www.example.com/order/include_rsa.asp?pressReleaseID=5 AND 

xp_cmdshell ‘format c: /q /yes ‘; drop database myDB; --

D. Reboot the web server by running: 

http://www.example.com/order/include_rsa.asp?pressReleaseID=5 

AND xp_cmdshell ‘iisreset –reboot’; --

Answer: A 


Q152. What is a sniffing performed on a switched network called? 

A. Spoofed sniffing 

B. Passive sniffing 

C. Direct sniffing 

D. Active sniffing 

Answer: D 


Q153. Network Administrator Patricia is doing an audit of the network. Below are some of her findings concerning DNS. Which of these would be a cause for alarm? 

Select the best answer. 

A. There are two external DNS Servers for Internet domains. Both are AD integrated. 

B. All external DNS is done by an ISP. 

C. Internal AD Integrated DNS servers are using private DNS names that are 

D. unregistered. 

E. Private IP addresses are used on the internal network and are registered with the internal AD integrated DNS server. 

Answer: A 


Q154. You are programming a buffer overflow exploit and you want to create a NOP sled of 200 bytes in the program exploit.c 


What is the hexadecimal value of NOP instruction? 

A. 0x60 

B. 0x80 

C. 0x70 

D. 0x90 

Answer: D 


Q155. What are the limitations of Vulnerability scanners? (Select 2 answers) 

A. There are often better at detecting well-known vulnerabilities than more esoteric ones 

B. The scanning speed of their scanners are extremely high 

C. It is impossible for any,one scanning product to incorporate all known vulnerabilities in a timely manner 

D. The more vulnerabilities detected,the more tests required 

E. They are highly expensive and require per host scan license 

Answer: AC 


312-50v8 pdf exam

Rebirth 312-50v8 test:

Q156. Keystroke logging is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. 


How will you defend against hardware keyloggers when using public computers and Internet Kiosks? (Select 4 answers) 

A. Alternate between typing the login credentials and typing characters somewhere else in the focus window 

B. Type a wrong password first,later type the correct password on the login page defeating the keylogger recording 

C. Type a password beginning with the last letter and then using the mouse to move the cursor for each subsequent letter. 

D. The next key typed replaces selected text portion. E.g. if the password is "secret",one could type "s",then some dummy keys "asdfsd". Then these dummies could be selected with mouse,and next character from the password "e" is typed,which replaces the dummies "asdfsd" 

E. The next key typed replaces selected text portion. E.g. if the password is "secret",one could type "s",then some dummy keys "asdfsd". Then these dummies could be selected with mouse,and next character from the password "e" is typed,which replaces the dummies "asdfsd" 

Answer: ACDE 


Q157. Tess King is using the nslookup command to craft queries to list all DNS information (such as Name Servers, host names, MX records, CNAME records, glue records (delegation for child Domains), zone serial number, TimeToLive (TTL) records, etc) for a Domain. What do you think Tess King is trying to accomplish? Select the best answer. 

A. A zone harvesting 

B. A zone transfer 

C. A zone update 

D. A zone estimate 

Answer: B 


Q158. One of your junior administrator is concerned with Windows LM hashes and password cracking. In your discussion with them, which of the following are true statements that you would point out? 

Select the best answers. 

A. John the Ripper can be used to crack a variety of passwords,but one limitation is that the output doesn't show if the password is upper or lower case. 

B. BY using NTLMV1,you have implemented an effective countermeasure to password cracking. 

C. SYSKEY is an effective countermeasure. 

D. If a Windows LM password is 7 characters or less,the hash will be passed with the following characters,in HEX- 00112233445566778899. 

E. Enforcing Windows complex passwords is an effective countermeasure. 

Answer: ACE 


Q159. What is the correct command to run Netcat on a server using port 56 that spawns command shell when connected? 


A. nc -port 56 -s cmd.exe 

B. nc -p 56 -p -e shell.exe 

C. nc -r 56 -c cmd.exe 

D. nc -L 56 -t -e cmd.exe 

Answer: D 


Q160. What is a sheepdip? 

A. It is another name for Honeynet 

B. It is a machine used to coordinate honeynets 

C. It is the process of checking physical media for virus before they are used in a computer 

D. None of the above 

Answer: C