It is more faster and easier to pass the EC-Council 312-50v8 exam by using Actual EC-Council Certified Ethical Hacker v8 questuins and answers. Immediate access to the Most recent 312-50v8 Exam and find the same core area 312-50v8 questions with professionally verified answers, then PASS your exam with a high score now.

2021 Sep 312-50v8 exam price

Q181. You suspect that your Windows machine has been compromised with a Trojan virus. When you run anti-virus software it does not pick of the Trojan. Next you run netstat command to look for open ports and you notice a strange port 6666 open. 

What is the next step you would do? 

A. Re-install the operating system. 

B. Re-run anti-virus software. 

C. Install and run Trojan removal software. 

D. Run utility fport and look for the application executable that listens on port 6666. 

Answer: D 


Q182. Which of the following is a detective control? 

A. Smart card authentication 

B. Security policy 

C. Audit trail 

D. Continuity of operations plan 

Answer: C 


Q183. SOAP services use which technology to format information? 

A. SATA 

B. PCI 

C. XML 

D. ISDN 

Answer: C 


Q184. Which definition below best describes a covert channel? 

A. A server program using a port that is not well known 

B. Making use of a protocol in a way it was not intended to be used 

C. It is the multiplexing taking place on a communication link 

D. It is one of the weak channels used by WEP that makes it insecure 

Answer: B 


Q185. Consider the following code: 

URL:http://www.certified.com/search.pl? 

text=<script>alert(document.cookie)</script> 

If an attacker can trick a victim user to click a link like this, and the Web application does not validate input, then the victim's browser will pop up an alert showing the users current set of cookies. An attacker can do much more damage, including stealing passwords, resetting your home page, or redirecting the user to another Web site. 

What is the countermeasure against XSS scripting? 

A. Create an IP access list and restrict connections based on port number 

B. Replace "<" and ">" characters with "& l t;" and "& g t;" using server scripts 

C. Disable Javascript in IE and Firefox browsers 

D. Connect to the server using HTTPS protocol instead of HTTP 

Answer: B 


312-50v8 free question

Improved 312-50v8 brain dumps:

Q186. Tess King, the evil hacker, is purposely sending fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65, 536 bytes. From the information given, what type of attack is Tess King attempting to perform? 

A. Syn flood 

B. Smurf 

C. Ping of death 

D. Fraggle 


Answer: C 


Q187. For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with which key? 

A. Sender's public key 

B. Receiver's private key 

C. Receiver's public key 

D. Sender's private key 

Answer: D 


Q188. Which of the following snort rules look for FTP root login attempts? 

A. alert tcp -> any port 21 (msg:"user root";) 

B. alert tcp -> any port 21 (message:"user root";) 

C. alert ftp -> ftp (content:"user password root";) 

D. alert tcp any any -> any any 21 (content:"user root";) 

Answer: D 


Q189. A zone file consists of which of the following Resource Records (RRs)? 

A. DNS,NS,AXFR,and MX records 

B. DNS,NS,PTR,and MX records 

C. SOA,NS,AXFR,and MX records 

D. SOA,NS,A,and MX records 

Answer: D 


Q190. A program that defends against a port scanner will attempt to: 

A. Sends back bogus data to the port scanner 

B. Log a violation and recommend use of security-auditing tools 

C. Limit access by the scanning system to publicly available ports only 

D. Update a firewall rule in real time to prevent the port scan from being completed 

Answer: D