312-50 Examcollection VCE

Page 1

ECCouncil 312-50 Ethical Hacking and Countermeasures


Enjoy your success in ECCouncil Certification Exams with our Ethical Hacking and Countermeasures Exam Dumps!!! 312-50 Dumps Questions Answers with Ethical Hacking and Countermeasures Practice Test software is a success leading way towards your ECCouncil 312-50 Exam. All the 312-50 Questions Answers are tested and approved by professional experts to assure 100% success in ECCouncil Certified Ethical Hacker exam. 312-50 Examcollection

312-50 VCE


You don’t need to take any stress about your 312-50 Exam VCE. Examcollection provide you some demo question & answer of 312-50 Examcollection.

312-50 Examcollection

312-50 VCE


Question NO 1, The terrorist organizations are increasingly blocking all traffic from North America or from Internet Protocol addresses that point to users who rely on the English Language. Hackers sometimes set a number of criteria for accessing their website. This information is shared among the co-hackers. For example if you are using a machine with the Linux Operating System and the Netscape browser then you will have access to their website in a convert way. When federal investigators using PCs running windows and using Internet Explorer visited the hacker’s shared site, the hacker’s system immediately mounted a distributed denial-of-service attack against the federal system. Companies today are engaging in tracking competitor’s through reverse IP address lookup sites like whois.com, which provide an IP address’s domain. When the competitor visits the companies website they are directed to a products page without discount and prices are marked higher for their product. When normal users visit the website they are directed to a page with full-blown product details along with attractive discounts. This is based on IP-based blocking, where certain addresses are barred from accessing a site. What is this masking technique called? A. Website Cloaking B. Website Filtering C. IP Access Blockade D. Mirrored WebSite Answer: A

https://www.examcollection.us/312-50-vce.html


Question NO 2, John has performed a scan of the web server with NMAP but did not gather enough information to accurately identify which operating system is running on the remote host. How could you use a web server to help in identifying the OS that is being used? A. Telnet to an Open port and grab the banner B. Connect to the web server with an FTP client C. Connect to the web server with a browser and look at the web page D. Telnet to port 8080 on the web server and look at the default page code Answer: A

https://www.examcollection.us/312-50-vce.html


Question NO 3, Exhibit:

https://www.examcollection.us/312-50-vce.html


You have captured some packets in Ethereal. You want to view only packets sent from 10.0.0.22. What filter will you apply? A. ip = 10.0.0.22 B. ip.src == 10.0.0.22 C. ip.equals 10.0.0.22 D. ip.address = 10.0.0.22 Answer: B

https://www.examcollection.us/312-50-vce.html


Question NO 4, Which tool/utility can help you extract the application layer data from each TCP connection from a log file into separate files? A. Snort B. argus C. TCPflow D. Tcpdump Answer: C

https://www.examcollection.us/312-50-vce.html


Question NO 5, A remote user tries to login to a secure network using Telnet, but accidently types in an invalid user name or password. Which responses would NOT be preferred by an experienced Security Manager? (multiple answer) A. Invalid Username B. Invalid Password C. Authentication Failure D. Login Attempt Failed E. Access Denied Answer: A,B

https://www.examcollection.us/312-50-vce.html


Question NO 6, Liza has forgotten her password to an online bookstore. The web application asks her to key in her email so that they can send her the password. Liza enters her email liza@yahoo.com'. The application displays server error. What is wrong with the web application? A. The email is not valid B. User input is not sanitized C. The web server may be down D. The ISP connection is not reliable Answer: B

https://www.examcollection.us/312-50-vce.html


Question NO 7, Snort is an open source Intrusion Detection system. However, it can also be used for a few other purposes as well. Which of the choices below indicate the other features offered by Snort? A. IDS, Packet Logger, Sniffer B. IDS, Firewall, Sniffer C. IDS, Sniffer, Proxy D. IDS, Sniffer, content inspector Answer: A

https://www.examcollection.us/312-50-vce.html


Question NO 8, Richard is a network Administrator working at a student loan company in lowa. This company processes over 20,000 students loan a year from colleges all over the state. Most communication between the company, schools and lenders is carried out through email. Because of privacy laws that are in the process of being implemented, Richard wants to get ahead of the game and become compliant before any sort of auditing occurs. Much of the email communication used at his company contains sensitive information such as social security numbers. For this reason, Richard wants to utilize email encryption agency-wide. The only problem for Richard is that his department only has couple of servers and they are utilized to their full capacity. Since a server-based PKI is not an option for him, he is looking for a low/no cost solution to encrypt email. What should Richard use? A. PGP B. RSA C. 3DES D. OTP Answer: A

https://www.examcollection.us/312-50-vce.html


Question NO 9, One of the most common and the best way of cracking RSA encryption is to being to derive the two prime numbers, which are used in the RSA PKI mathematical process. If the two numbers p and q are discovered through a _________________ process, then the private key can be derived. A. Factorization B. Prime Detection C. Hashing D. Brute-forcing Answer: A

https://www.examcollection.us/312-50-vce.html


Question NO 10, You work for Acme Corporation as Sales Manager. The company has tight network security restrictions. You are trying to steal data from the company's Sales database (Sales.xls) and transfer them to your home computer. Your company filters and monitors traffic that leaves from the internal network to the Internet. How will you achieve this without raising suspicion? A. Encrypt the Sales.xls using PGP and e-mail it to your personal gmail account B. Package the Sales.xls using Trojan wrappers and telnet them back your home computer C. You can conceal the Sales.xls database in another file like photo.jpg or other files and send it out in an innocent looking email or file transfer using Steganography techniques D. Change the extension of Sales.xls to sales.txt and upload them as attachment to your hotmail account Answer: C

https://www.examcollection.us/312-50-vce.html


312-50 Examcollection

312-50 VCE


312-50 Examcollection

312-50 VCE


Good luck Examcollection provides you guaranteed success in 312-50 exam as we have latest 312-50 exam dumps. Click Here following link to download 312-50 VCE.

312-50 Examcollection

312-50 VCE


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.