The particular EC-Council 312-50 questions and answers are usually up to date simply by the technicians in real time. Youre going to get the latest simulated check queries which are in step with the present EC-Council test. A lot more notably, the update time extended to 180 days, displaying you will probably have half a years time to research 312-50 dumps.

2017 Apr 312-50 exam price

Q81. Which of the following attacks takes best advantage of an existing authenticated connection 

A. Spoofing 

B. Session Hijacking 

C. Password Sniffing 

D. Password Guessing 

Answer: B

Explanation: Session hijacking is the act of taking control of a user session after successfully obtaining or generating an authentication session ID. Session hijacking involves an attacker using captured, brute forced or reverse-engineered session IDs to seize control of a legitimate user's Web application session while that session is still in progress. 

Q82. You are writing security policy that hardens and prevents Footprinting attempt by Hackers. Which of the following countermeasures will NOT be effective against this attack? 

A. Configure routers to restrict the responses to Footprinting requests 

B. Configure Web Servers to avoid information leakage and disable unwanted protocols 

C. Lock the ports with suitable Firewall configuration 

D. Use an IDS that can be configured to refuse suspicious traffic and pick up Footprinting patterns 

E. Evaluate the information before publishing it on the Website/Intranet 

F. Monitor every employee computer with Spy cameras, keyloggers and spy on them 

G. Perform Footprinting techniques and remove any sensitive information found on DMZ sites 

H. Prevent search engines from caching a Webpage and use anonymous registration services 

I. Disable directory and use split-DNS 

Answer: F

Q83. Jim is having no luck performing a penetration test in company’s network. He is running the tests from home and has downloaded every security scanner that he could lay his hands on. Despite knowing the IP range of all the systems, and the exact network configuration, Jim is unable to get any useful results. 

Why is Jim having these problems? 

A. Security scanners are not designed to do testing through a firewall. 

B. Security scanners cannot perform vulnerability linkage. 

C. Security scanners are only as smart as their database and cannot find unpublished vulnerabilities. 

D. All of the above. 

Answer: D

Explanation: The Security scanners available online are often to “outdated” to perform a live pentest against a victim. 

Q84. Richard is a network Administrator working at a student loan company in lowa. This company processes over 20,000 students loan a year from colleges all over the state. Most communication between the company, schools and lenders is carried out through email. Because of privacy laws that are in the process of being implemented, Richard wants to get ahead of the game and become compliant before any sort of auditing occurs. Much of the email communication used at his company contains sensitive information such as social security numbers. For this reason, Richard wants to utilize email encryption agency-wide. The only problem for Richard is that his department only has couple of servers and they are utilized to their full capacity. Since a server-based PKI is not an option for him, he is looking for a low/no cost solution to encrypt email. 

What should Richard use? 



C. 3DES 


Answer: A

Explanation: PGP (Pretty Good Privacy) is an encryption program being used for secure transmission of files and e-mails. This adapts public-key encryption technology in which pairs of keys are used to maintain secure communication. For PGP-based communication both the sender and receiver should have public and private key pairs. The sender's public key should be distributed to the receiver. Similarly, the receiver's public key should be distributed to the sender. When sending a message or a file, the sender can sign using his private key. Also, the sender's private key is never distributed. All encryption is made on the workstation sending the e-mail. 

Q85. Who is an Ethical Hacker? 

A. A person who hacks for ethical reasons 

B. A person who hacks for an ethical cause 

C. A person who hacks for defensive purposes 

D. A person who hacks for offensive purposes 

Answer: C

Explanation: The Ethical hacker is a security professional who applies his hacking skills for defensive purposes. 

Renew 312-50 exam question:

Q86. Which of the following encryption is not based on Block Cipher? 


B. Blowfish 


D. RC4 

Answer: D

Explanation: RC4 (also known as ARC4 or ARCFOUR) is the most widely-used software stream cipher and is used in popular protocols such as Secure Sockets Layer (SSL) (to protect Internet traffic) and WEP (to secure wireless networks). 

Topic 22, Penetration Testing Methodologies 

556. Joel and her team have been going through tons of garbage, recycled paper, and other rubbish in order to find some information about the target they are attempting to penetrate. 

What would you call this kind of activity? 

A. CI Gathering 

B. Scanning 

C. Dumpster Diving 

D. Garbage Scooping 

Answer: C

Q87. Exhibit 

You receive an e-mail with the message displayed in the exhibit. 

From this e-mail you suspect that this message was sent by some hacker since you have using their e-mail services for the last 2 years and they never sent out an e-mail as this. You also observe the URL in the message and confirm your suspicion about 340590649. You immediately enter the following at the Windows 2000 command prompt. 

ping 340590649 

You get a response with a valid IP address. What is the obstructed IP address in the e-mail URL? 





Answer: C

Explanation: Convert the number in binary, then start from last 8 bits and convert them to decimal to get the last octet (in this case .5) 

Q88. Bob wants to prevent attackers from sniffing his passwords on the wired network. Which of the following lists the best options? 


B. SSID, WEP, Kerberos 

C. SMB, SMTP, Smart card 

D. Kerberos, Smart card, Stanford SRP 

Answer: D

Explanation: Kerberos, Smart cards and Stanford SRP are techniques where the password never leaves the computer. 

Q89. One of your junior administrator is concerned with Windows LM hashes and password cracking. In your discussion with them, which of the following are true statements that you would point out? 

Select the best answers. 

A. John the Ripper can be used to crack a variety of passwords, but one limitation is that the output doesn't show if the password is upper or lower case. 

B. BY using NTLMV1, you have implemented an effective countermeasure to password cracking. 

C. SYSKEY is an effective countermeasure. 

D. If a Windows LM password is 7 characters or less, the hash will be passed with the following characters, in HEX- 00112233445566778899. 

E. Enforcing Windows complex passwords is an effective countermeasure. 

Answer: ACE


John the Ripper can be used to crack a variety of passwords, but one limitation is that the output doesn't show if the password is upper or lower case. John the Ripper is a very effective password cracker. It can crack passwords for many different types of operating systems. However, one limitation is that the output doesn't show if the password is upper or lower case. BY using NTLMV1, you have implemented an effective countermeasure to password cracking. NTLM Version 2 (NTLMV2) is a good countermeasure to LM password cracking (and therefore a correct answer). To do this, set Windows 9x and NT systems to "send NTLMv2 responses only". SYSKEY is an effective countermeasure. It uses 128 bit encryption on the local copy of the Windows SAM. If a Windows LM password is 7 characters or less, the has will be passed with the following characters: 0xAAD3B435B51404EE Enforcing Windows complex passwords is an effective countermeasure to password cracking. Complex passwords are- greater than 6 characters and have any 3 of the following 4 items: upper case, lower case, special characters, and numbers. 

Q90. Study the snort rule given below and interpret the rule. 

alert tcp any any --> 111 (content:"|00 01 86 a5|"; msg: "mountd access";) 

A. An alert is generated when a TCP packet is originated from port 111 of any IP address to the subnet 

B. An alert is generated when any packet other than a TCP packet is seen on the network and destined for the subnet 

C. An alert is generated when a TCP packet is generated from any IP on the subnet and destined to any IP on port 111 

D. An alert is generated when a TCP packet originating from any IP address is seen on the network and destined for any IP address on the subnet on port 111 

Answer: D

Explanation: Refer to the online documentation on creating Snort rules at