Exam Code: 312-50v8 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Certified Ethical Hacker v8
Certification Provider: EC-Council
Free Today! Guaranteed Training- Pass 312-50v8 Exam.

2021 Sep 312-50v8 practice test

Q211. In which part of OSI layer, ARP Poisoning occurs? A. Transport Layer 


B. Datalink Layer 

C. Physical Layer 

D. Application layer 

Answer: B 


Q212. Which of the statements concerning proxy firewalls is correct? 

A. Proxy firewalls increase the speed and functionality of a network. 

B. Firewall proxy servers decentralize all activity for an application. 

C. Proxy firewalls block network packets from passing to and from a protected network. 

D. Computers establish a connection with a proxy firewall which initiates a new network connection for the client. 

Answer: D 


Q213. What is a NULL scan? 

A. A scan in which all flags are turned off 

B. A scan in which certain flags are off 

C. A scan in which all flags are on 

D. A scan in which the packet size is set to zero 

E. A scan with a illegal packet size 

Answer: A 


Q214. Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process..Which of the following is.the correct bit size of the Diffie-Hellman (DH) group 5? 

A. 768 bit key 

B. 1025 bit key 

C. 1536 bit key 

D. 2048 bit key 

Answer: C 


Q215. John the hacker is sniffing the network to inject ARP packets. He injects broadcast frames onto the wire to conduct MiTM attack. What is the destination MAC address of a broadcast frame? 

A. 0xFFFFFFFFFFFF 

B. 0xDDDDDDDDDDDD 

C. 0xAAAAAAAAAAAA 

D. 0xBBBBBBBBBBBB 

Answer: A 


312-50v8 practice test

Replace 312-50v8 practice test:

Q216. Look at the following SQL query. 

SELECT * FROM product WHERE PCategory='computers' or 1=1--' 

What will it return? Select the best answer. 

A. All computers and all 1's 

B. All computers 

C. All computers and everything else 

D. Everything except computers 

Answer: C 


Q217. What is the advantage in encrypting the communication between the agent and the monitor in an Intrusion Detection System? 

A. Encryption of agent communications will conceal the presence of the agents 

B. The monitor will know if counterfeit messages are being generated because they will not be encrypted 

C. Alerts are sent to the monitor when a potential intrusion is detected 

D. An intruder could intercept and delete data or alerts and the intrusion can go undetected 

Answer: B 


Q218. Pentest results.indicate that voice over IP traffic is traversing a network..Which of the following tools will decode a packet capture and extract the voice conversations? 

A. Cain 

B. John the Ripper 

C. Nikto 

D. Hping 

Answer: A 


Q219. You are doing IP spoofing while you scan your target. You find that the target has port 23 open. Anyway you are unable to connect. Why? 

A. A firewall is blocking port 23 

B. You cannot spoof + TCP 

C. You need an automated telnet tool 

D. The OS does not reply to telnet even if port 23 is open 

Answer: A 


Q220. What flags are set in a X-MAS scan?(Choose all that apply. 

A. SYN 

B. ACK 

C. FIN 

D. PSH 

E. RST 

F. URG 

Answer: CDF