EC-Council EC-Council certification exam is called EC-Council 312-50v8 exam which is by no means an straightforward test. Numerous graduates who significant in web technology tend to be eager to get certified. There are lots of EC-Council 312-50v8 exam studying materials as well as online training course in the market. Pick a suitable along with valuable EC-Council preparation supplies is a good essential job.

2021 Oct 312-50v8 real exam

Q21. Ethereal works best on ____________. 

A. Switched networks 

B. Linux platforms 

C. Networks using hubs 

D. Windows platforms 

E. LAN's 

Answer: C 


Q22. The SNMP Read-Only Community String is like a password. The string is sent along with each SNMP Get-Request and allows (or denies) access to a device. Most network vendors ship their equipment with a default password of "public". This is the so-called "default public community string". How would you keep intruders from getting sensitive information regarding the network devices using SNMP? (Select 2 answers) 

A. Enable SNMPv3 which encrypts username/password authentication 

B. Use your company name as the public community string replacing the default 'public' 

C. Enable IP filtering to limit access to SNMP device 

D. The default configuration provided by device vendors is highly secure and you don't need to change anything 

Answer: AC 


Q23. Which of the following can take an arbitrary length of input and produce a message digest output of 160 bit? 

A. SHA-1 

B. MD5 

C. HAVAL 

D. MD4 

Answer: A 


Q24. You have successfully gained access to a victim's computer using Windows 2003 Server SMB Vulnerability. Which command will you run to disable auditing from the cmd? 

A. stoplog stoplog ? 

B. EnterPol /nolog 

C. EventViewer o service 

D. auditpol.exe /disable 

Answer: D 


Q25. What is the key advantage of Session Hijacking? 

A. It can be easily done and does not require sophisticated skills. 

B. You can take advantage of an authenticated connection. 

C. You can successfully predict the sequence number generation. 

D. You cannot be traced in case the hijack is detected. 

Answer: B 


Up to the immediate present 312-50v8 exam answers:

Q26. Bluetooth uses which digital modulation technique to exchange information between paired devices? 

A. PSK (phase-shift keying) 

B. FSK (frequency-shift keying) 

C. ASK (amplitude-shift keying) 

D. QAM (quadrature amplitude modulation) 

Answer: A 


Q27. Snort has been used to capture packets on the network. On studying the packets, the penetration tester finds it to be abnormal. If you were the penetration tester, why would you find this abnormal? 

What is odd about this attack? (Choose the most appropriate statement) 

A. This is not a spoofed packet as the IP stack has increasing numbers for the three flags. 

B. This is back orifice activity as the scan comes from port 31337. 

C. The attacker wants to avoid creating a sub-carrier connection that is not normally valid. 

D. There packets were created by a tool; they were not created by a standard IP stack. 

Answer: B 


Q28. After studying the following log entries, what is the attacker ultimately trying to achieve as inferred from the log sequence? 

1. mkdir -p /etc/X11/applnk/Internet/.etc 

2. mkdir -p /etc/X11/applnk/Internet/.etcpasswd 

3. touch -acmr /etc/passwd /etc/X11/applnk/Internet/.etcpasswd 

4. touch -acmr /etc /etc/X11/applnk/Internet/.etc 

5. passwd nobody -d 

6. /usr/sbin/adduser dns -d/bin -u 0 -g 0 -s/bin/bash 

7. passwd dns -d 

8. touch -acmr /etc/X11/applnk/Internet/.etcpasswd /etc/passwd 

9. touch -acmr /etc/X11/applnk/Internet/.etc /etc 

A. Change password of user nobody 

B. Extract information from a local directory 

C. Change the files Modification Access Creation times 

D. Download rootkits and passwords into a new directory 

Answer: C 


Q29. Johnny is a member of the hacking group Orpheus1. He is currently working on breaking into the Department of Defense's front end Exchange Server. He was able to get into the server, located in a DMZ, by using an unused service account that had a very weak password that he was able to guess. Johnny wants to crack the administrator password, but does not have a lot of time to crack it. He wants to use a tool that already has the LM hashes computed for all possible permutations of the administrator password. 


What tool would be best used to accomplish this? 

A. SMBCrack 

B. SmurfCrack 

C. PSCrack 

D. RainbowTables 

Answer: D 


Q30. This tool is widely used for ARP Poisoning attack. Name the tool. 


A. Cain and Able 

B. Beat Infector 

C. Poison Ivy 

D. Webarp Infector 

Answer: A