Our pass rate is high to 98.9% and the similarity percentage between our 312-50 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the EC-Council 312-50 exam in just one try? I am currently studying for the EC-Council 312-50 exam. Latest EC-Council 312-50 Test exam practice questions and answers, Try EC-Council 312-50 Brain Dumps First.

Q21. Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks? 

A. Port Security 

B. Switch Mapping 

C. Port Reconfiguring 

D. Multiple Recognition 

Answer: A

Explanation: With Port Security the switch will keep track of which ports are allowed to send traffic on a port. 


Q22. Which DNS resource record can indicate how long any "DNS poisoning" could last? 

A. MX 

B. SOA 

C. NS 

D. TIMEOUT 

Answer: B

Explanation: The SOA contains information of secondary servers, update intervals and expiration times. 


Q23. How do you defend against DHCP Starvation attack? 

A. Enable ARP-Block on the switch 

B. Enable DHCP snooping on the switch 

C. Configure DHCP-BLOCK to 1 on the switch 

D. Install DHCP filters on the switch to block this attack 

Answer: B


Q24. The terrorist organizations are increasingly blocking all traffic from North America or from Internet Protocol addresses that point to users who rely on the English Language. 

Hackers sometimes set a number of criteria for accessing their website. This information is shared among the co-hackers. For example if you are using a machine with the Linux Operating System and the Netscape browser then you will have access to their website in a convert way. When federal investigators using PCs running windows and using Internet Explorer visited the hacker’s shared site, the hacker’s system immediately mounted a distributed denial-of-service attack against the federal system. 

Companies today are engaging in tracking competitor’s through reverse IP address lookup sites like whois.com, which provide an IP address’s domain. When the competitor visits the companies website they are directed to a products page without discount and prices are marked higher for their product. When normal users visit the website they are directed to a page with full-blown product details along with attractive discounts. This is based on IP-based blocking, where certain addresses are barred from accessing a site. 

What is this masking technique called? 

A. Website Cloaking 

B. Website Filtering 

C. IP Access Blockade 

D. Mirrored WebSite 

Answer: A

Explanation: Website Cloaking travels under a variety of alias including Stealth, Stealth scripts, IP delivery, Food Script, and Phantom page technology. It’s hot- due to its ability to manipulate those elusive top-ranking results from spider search engines. 


Q25. You are configuring the security options of your mail server and you would like to block certain file attachments to prevent viruses and malware from entering the users inbox. 

Which of the following file formats will you block? 

(Select up to 6) 

A. .txt 

B. .vbs 

C. .pif 

D. .jpg 

E. .gif 

F. .com 

G. .htm 

H. .rar 

I. .scr 

J. .exe 

Answer: BCEFIJ

Explanation: http://office.microsoft.com/en-us/outlook/HP030850041033.aspx 


Q26. Which of these are phases of a reverse social engineering attack? 

Select the best answers. 

A. Sabotage 

B. Assisting 

C. Deceiving 

D. Advertising 

E. Manipulating 

Answer: ABD

Explanations: 

According to "Methods of Hacking: Social Engineering", by Rick Nelson, the three phases of reverse social engineering attacks are sabotage, advertising, and assisting. 


Q27. User which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud? 

A. 18 U.S.C 1029 Possession of Access Devices 

B. 18 U.S.C 1030 Fraud and related activity in connection with computers 

C. 18 U.S.C 1343 Fraud by wire, radio or television 

D. 18 U.S.C 1361 Injury to Government Property 

E. 18 U.S.C 1362 Government communication systems 

F. 18 U.S.C 1831 Economic Espionage Act 

G. 18 U.S.C 1832 Trade Secrets Act 

Answer: B

Explanation: http://www.law.cornell.edu/uscode/html/uscode18/usc_sec_18_00001030----000-.html 


Q28. You are the security administrator for a large online auction company based out of Los Angeles. After getting your ENSA CERTIFICATION last year, you have steadily been fortifying your network’s security including training OS hardening and network security. One of the last things you just changed for security reasons was to modify all the built-in administrator accounts on the local computers of PCs and in Active Directory. After through testing you found and no services or programs were affected by the name changes. 

Your company undergoes an outside security audit by a consulting company and they said that even through all the administrator account names were changed, the accounts could still be used by a clever hacker to gain unauthorized access. You argue with the auditors and say that is not possible, so they use a tool and show you how easy it is to utilize the administrator account even though its name was changed. 

What tool did the auditors use? 

A. sid2user 

B. User2sid 

C. GetAcct 

D. Fingerprint 

Answer: A

Explanation: User2sid.exe can retrieve a SID from the SAM (Security Accounts Manager) from the local or a remote machine Sid2user.exe can then be used to retrieve the names of all the user accounts and more. 


Q29. Attackers footprint target Websites using Google Hacking techniques. Google hacking is a term that refers to the art of creating complex search engine queries. It detects websites that are vulnerable to numerous exploits and vulnerabilities. Google operators are used to locate specific strings of text within the search results. 

The configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database. WordPress uses config.php that stores the database Username and Password. 

Which of the below Google search string brings up sites with "config.php" files? 

A. Search:index config/php 

B. Wordpress:index config.php 

C. intitle:index.of config.php 

D. Config.php:index list 

Answer: C


Q30. A particular database threat utilizes a SQL injection technique to penetrate a target system. How would an attacker use this technique to compromise a database? 

A. An attacker uses poorly designed input validation routines to create or alter SQL commands to gain access to unintended data or execute commands of the database 

B. An attacker submits user input that executes an operating system command to compromise a target system 

C. An attacker gains control of system to flood the target system with requests, preventing legitimate users from gaining access 

D. An attacker utilizes an incorrect configuration that leads to access with higher-than-expected privilege of the database 

Answer: A

Explanation: Using the poorly designed input validation to alter or steal data from a database is a SQL injection attack.