Sei sulla pagina 1di 20

Pass You

ECCOUNCIL 312-
50 Exam in The
First Attempt
A Certified Ethical Hacker is a skilled
professional who understands and knows how
to look for weaknesses and vulnerabilities in
Introduction target systems and uses the same knowledge
and tools as a malicious hacker, but in a lawful
and legitimate manner to assess the security
posture of a target system(s). The CEH
credential certifies individuals in the specific
network security discipline of Ethical Hacking
from a vendor-neutral perspective.

https://www.certs4you.com/ECCouncil/312-50-dumps.html
Hello!
I am Jayden Smith
Marketing Expert @Certs4you
Success is no accident. It is hard work,
perseverance, learning, studying,
sacrifice and most of all, love of what
you are doing or learning to do.
Key Points Make A Scheduled
to pass the Stick on It
exam! Practice

https://www.certs4you.com/ECCouncil/312-50-dumps.html
BIG CONCEPT
Get 312-50 Latest Exam Questions

Visit us!

https://www.certs4you.com/ECCouncil/312-50-dumps.html
Question No 1:

Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and uses
the special card in order to access the restricted area of the target company. Just as the employee opens the
door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so that
he can enter. What is the best way to undermine the social engineering activity of tailgating?

A. issue special cards to access secured doors at the company and provide a one-time
only brief description of use of the special card
B. to post a sign that states no tailgating next to the special card reader adjacent to the
secured door
C. setup a mock video camera next to the special card reader adjacent to the secured door
D. to educate all of the employees of the company on best security practices on a recurring
basis

Answer: D

https://www.certs4you.com/ECCouncil/312-50-dumps.html
Question No 2:

____________ will let you assume a users identity at a dynamically generated web page or site.

A. SQL attack
B. Injection attack
C. Cross site scripting
D. The shell attack
E. Winzapper

Answer: C

https://www.certs4you.com/ECCouncil/312-50-dumps.html
Question No 3:

Which of the following is NOT a reason 802.11 WEP encryption is vulnerable?

A. There is no mutual authentication between wireless clients and access points


B. Automated tools like AirSnort are available to discover WEP keys
C. The standard does not provide for centralized key management
D. The 24 bit Initialization Vector (IV) field is too small

Answer: C

https://www.certs4you.com/ECCouncil/312-50-dumps.html
Question No 4:

Given the following extract from the snort log


on a honeypot, what service is being
exploited? :

A. FTP
B. SSH
C. Telnet
D. SMTP

Answer: A

https://www.certs4you.com/ECCouncil/312
-50-dumps.html
Question No 5:

Statistics from cert.org and other leading security organizations has clearly showed
a steady rise in the number of hacking incidents perpetrated against companies.
What do you think is the main reason behind the significant increase in hacking
attempts over the past years?

A. It is getting more challenging and harder to hack for non technical people.
B. There is a phenomenal increase in processing power.
C. New TCP/IP stack features are constantly being added.
D. The ease with which hacker tools are available on the Internet.

Answer: D

https://www.certs4you.com/ECCouncil/312-50-dumps.html
Question No 6:

Snort is an open source Intrusion Detection system. However, it can also be used for a few other purposes as
well. Which of the choices below indicate the other features offered by Snort?

A. IDS, Packet Logger, Sniffer


B. IDS, Firewall, Sniffer
C. IDS, Sniffer, Proxy
D. IDS, Sniffer, content inspector

Answer: A

https://www.certs4you.com/ECCouncil/312-50-dumps.html
Question No 7:

A buffer overflow occurs when a program or process tries to store more data in a
buffer (temporary data storage area) then it was intended to hold.
What is the most common cause of buffer overflow in software today?

A. Bad permissions on files.


B. High bandwidth and large number of users.
C. Usage of non standard programming languages.
D. Bad quality assurance on software produced.

Answer: D

https://www.certs4you.com/ECCouncil/312-50-dumps.html
Question No 8:

The GET method should never be used when sensitive data such as credit card is being sent to a CGI program.
This is because any GET command will appear in the URL, and will be logged by any servers. For example, let's
say that you've entered your credit card information into a form that uses the GET method. The URL may appear
like this: https://www.xsecurity-bank.com/creditcard.asp?cardnumber=453453433532234
The GET method appends the credit card number to the URL. This means that anyone with
access to a server log will be able to obtain this information. How would you protect from
this type of attack?

A. Never include sensitive information in a script


B. Use HTTPS SSLv3 to send the data instead of plain HTTPS
C. Replace the GET with POST method when sending data
D. Encrypt the data before you send using GET method

Answer: C

https://www.certs4you.com/ECCouncil/312-50-dumps.html
Question No 9:

Curt has successfully compromised a web server sitting behind a firewall using a
vulnerability in the web server program. He would now like to install a backdoor program
but knows that all ports are not open inbound on the firewall. Which port in the list below
will most likely be open and allowed to reach the server that Curt has just compromised?
(Select the Best Answer)

A. 53
B. 25
C. 110
D. 69

Answer: A

https://www.certs4you.com/ECCouncil/312-50-dumps.html
Question No 10:

What type of port scan is represented here.

A. Stealth Scan
B. Full Scan
C. XMAS Scan
D. FIN Scan

Answer: A

https://www.certs4you.com/ECCouncil/312-50-dumps.html
Get 20% Discount
on ECCOUNCIL 312-
50 by using this
coupon code
"4yc20" 20%
https://www.certs4you.com/ECCouncil/312-50-
dumps.html
Why Choose Us?

100% 312-50 Exam Passing Guarantee


100% 312-50 Real Exam Questions Answers Dumps PDF
100% 312-50 Real Exam Simulation
Client Privacy
3 Months Free Updates

https://www.certs4you.com/ECCouncil/312-50-dumps.html
Thanks!
Any questions?
You can find me at
https://www.certs4you.com/ECCouncil/
312-50-dumps.html

Potrebbero piacerti anche