Cause all that matters here is passing the EC-Council 312-50v8 exam. Cause all that you need is a high score of 312-50v8 Certified Ethical Hacker v8 exam. The only one thing you need to do is downloading Examcollection 312-50v8 exam study guides now. We will not let you down with our money-back guarantee.

2021 Oct 312-50v8 practice test

Q231. One of your team members has asked you to analyze the following SOA record. What is the version? 

Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 

3600 604800 2400. 

A. 200303028 

B. 3600 

C. 604800 

D. 2400 

E. 60 

F. 4800 

Answer:


Q232. A certified ethical hacker (CEH) is approached by a friend who believes her husband is cheating. She offers to pay to break into her husband's email account in order to find proof so she can take him to court..What is the ethical response? 

A. Say no; the friend is not the owner of the account. 

B. Say yes; the friend needs help to gather evidence. 

C. Say yes; do.the job for free. 

D. Say no; make sure that the friend knows the risk she’s asking the CEH.to take. 

Answer:


Q233. Study the log below and identify the scan type. 

A. nmap -sR 192.168.1.10 

B. nmap -sS 192.168.1.10 

C. nmap -sV 192.168.1.10 

D. nmap -sO -T 192.168.1.10 

Answer:


Q234. In the context of password security, a simple dictionary attack involves loading a dictionary file (a text file full of dictionary words) into a cracking application such as L0phtCrack or John the Ripper, and running it against user accounts located by the application. The larger the word and word fragment selection, the more effective the dictionary attack is. The brute force method is the most inclusive, although slow. It usually tries every possible letter and number combination in its automated exploration. 

If you would use both brute force and dictionary methods combined together to have variation of words, what would you call such an attack? 

A. Full Blown 

B. Thorough 

C. Hybrid 

D. BruteDics 

Answer:


Q235. June, a security analyst, understands that a polymorphic virus has the ability to mutate and can change its known viral signature and hide from signature-based antivirus programs. Can June use an antivirus program in this case and would it be effective against a polymorphic virus? 

A. Yes. June can use an antivirus program since it compares the parity bit of executable files to the database of known check sum counts and it is effective on a polymorphic virus 

B. Yes. June can use an antivirus program since it compares the signatures of executable files to the database of known viral signatures and it is very effective against a polymorphic virus 

C. No. June can't use an antivirus program since it compares the signatures of executable files to the database of known viral signatures and in the case the polymorphic viruses cannot be detected by a signature-based anti-virus program 

D. No. June can't use an antivirus program since it compares the size of executable files to the database of known viral signatures and it is effective on a polymorphic virus 

Answer:


Latest 312-50v8 practice test:

Q236. The GET method should never be used when sensitive data such as credit card is being sent to a CGI program. This is because any GET command will appear in the URL, and will be logged by any servers. For example, let's say that you've entered your credit card information into a form that uses the GET method. The URL may appear like this: 

https://www.xsecurity-bank.com/creditcard.asp?cardnumber=453453433532234 

The GET method appends the credit card number to the URL. This means that anyone with access to a server log will be able to obtain this information. How would you protect from this type of attack? 

A. Never include sensitive information in a script 

B. Use HTTPS SSLv3 to send the data instead of plain HTTPS 

C. Replace the GET with POST method when sending data 

D. Encrypt the data before you send using GET method 

Answer:


Q237. Which of the following attacks takes best advantage of an existing authenticated connection? 

A. Spoofing 

B. Session Hijacking 

C. Password Sniffing 

D. Password Guessing 

Answer:


Q238. Joe Hacker is going wardriving. He is going to use PrismStumbler and wants it to go to a GPS mapping software application. What is the recommended and well-known GPS 

mapping package that would interface with PrismStumbler? 

Select the best answer. 

A. GPSDrive 

B. GPSMap 

C. WinPcap 

D. Microsoft Mappoint 

Answer:


Q239. Which protocol and port number might be needed in order to send log messages to a log analysis tool that resides behind a firewall? 

A. UDP 123 

B. UDP 541 

C. UDP 514 

D. UDP 415 

Answer:


Q240. Which type of scan does NOT open a full TCP connection? 

A. Stealth Scan 

B. XMAS Scan 

C. Null Scan 

D. FIN Scan 

Answer: