Exam Code: 312-50v8 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Certified Ethical Hacker v8
Certification Provider: EC-Council
Free Today! Guaranteed Training- Pass 312-50v8 Exam.

2021 Sep 312-50v8 practice exam

Q1. One of the most common and the best way of cracking RSA encryption is to begin to derive the two prime numbers, which are used in the RSA PKI mathematical process. If the two numbers p and q are discovered through a _____________ process, then the private key can be derived. 

A. Factorization 

B. Prime Detection 

C. Hashing 

D. Brute-forcing 

Answer: A 


Q2. One advantage of an application-level firewall is the ability to 

A. filter packets at the network level. 

B. filter specific commands,such as http:post. 

C. retain state information for each packet. 

D. monitor tcp handshaking. 

Answer: B 


Q3. A consultant has been hired by the V.P. of a large financial organization to assess the company's security posture..During the security testing, the consultant comes across child pornography on the V.P.'s computer..What is the consultant's obligation to the financial organization? 

A. Say nothing and continue with the security testing. 

B. Stop work immediately and contact the authorities. 

C. Delete the pornography,say nothing,and continue security testing. 

D. Bring the discovery to the financial organization's human resource department. 

Answer: B 


Q4. To scan a host downstream from a security gateway, Firewalking: 

A. Sends a UDP-based packet that it knows will be blocked by the firewall to determine how specifically the firewall responds to such packets 

B. Uses the TTL function to send packets with a TTL value set to expire one hop past the identified security gateway 

C. Sends an ICMP ''administratively prohibited'' packet to determine if the gateway will drop the packet without comment. 

D. Assesses the security rules that relate to the target system before it sends packets to any hops on the route to the gateway 

Answer: B 


Q5. A company is using Windows Server 2003 for its Active Directory (AD). What.is the most efficient way to crack the passwords for the AD users? 

A. Perform a dictionary attack. 

B. Perform a brute force attack. 

C. Perform an attack with a rainbow table. 

D. Perform a hybrid attack. 

Answer: C 


312-50v8 latest exam

Replace 312-50v8 exam engine:

Q6. A newly discovered flaw in a software application would be considered which kind of security vulnerability? 

A. Input validation flaw 

B. HTTP header injection vulnerability 

C. 0-day vulnerability 

D. Time-to-check to time-to-use flaw 

Answer: C 


Q7. Jane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried that adversaries might be monitoring the communication link and could inspect captured traffic. She would like to tunnel the information to the remote end but does not have VPN capabilities to do so. Which of the following tools can she use to protect the link? 


A. MD5 

B. PGP 

C. RSA 

D. SSH 

Answer: D 


Q8. You are trying to hijack a telnet session from a victim machine with IP address 10.0.0.5 to Cisco router at 10.0.0.1. You sniff the traffic and attempt to predict the sequence and acknowledgement numbers to successfully hijack the telnet session. 

Here is the captured data in tcpdump. 


What are the next sequence and acknowledgement numbers that the router will send to the victim machine? 

A. Sequence number: 82980070 Acknowledgement number: 17768885A. 

B. Sequence number: 17768729 Acknowledgement number: 82980070B. 

C. Sequence number: 87000070 Acknowledgement number: 85320085C. 

D. Sequence number: 82980010 Acknowledgement number: 17768885D. 

Answer: A 


Q9. An attacker runs netcat tool to transfer a secret file between two hosts. 

Machine A: netcat -l -p 1234 < secretfile 

Machine B: netcat 192.168.3.4 > 1234 

He is worried about information being sniffed on the network. How would the attacker use netcat to encrypt the information before transmitting onto the wire? 

A. Machine A: netcat -l -p -s password 1234 < testfile Machine B: netcat <machine A IP> 1234 

B. Machine A: netcat -l -e magickey -p 1234 < testfile Machine B: netcat <machine A IP> 1234 

C. Machine A: netcat -l -p 1234 < testfile -pw password Machine B: netcat <machine A IP> 1234 -pw password 

D. Use cryptcat instead of netcat 

Answer: D 


Q10. When analyzing the IDS logs, the.system administrator noticed an alert was logged when.the external router was accessed from.the administrator's.computer.to update the router configuration. What type of.an alert is this? 

A. False positive.

B. False negative 

C. True positve 

D. True negative 

Answer: A