[Latest Version] Easily Pass 312-50 Exam With Updated 312-50 Preparation Materials

Anyone preparing to beat the EC-COUNCIL 312-50 exam knows that the 312-50 dumps resources are important. We’ve updated you with 312-50 dumps to provide you with the best, latest Educational Hacker Certified exam resources to help you easily pass the 312-50 exam.

Choosing a PassITDump 312-50 dumps resource is a success in choosing the 312-50 exam.

312-50312-50 free dumps or download 312-50 dumps here.

Question 1:

What are the two basic types of attacks?(Choose two.

A. DoS

B. Passive

C. Sniffing

D. Active

E. Cracking

Correct Answer: BD

Passive and active attacks are the two basic types of attacks.


Question 2:

Bob was frustrated with his competitor, Brownies Inc., and decided to launch an attack that would result in serious financial losses. He planned the attack carefully and carried out the attack at the appropriate moment. Meanwhile, Trent, an administrator at Brownies Inc., realized that their main financial transaction server had been attacked. As a result of the attack, the server crashed and Trent needed to reboot the system, as no one was able to access the resources of the company. This process involves human interaction to fix it. What kind of Denial of Service attack was best illustrated in the scenario above?

A. DOS attacks which involves flooding a network or system

B. DOS attacks which involves crashing a network or system

C. DOS attacks which is done accidentally or deliberately

D. Simple DDOS attack

Correct Answer: B

This is not a DDOS, there is only one person involved as attacker


Question 3:

WWW wanderers or spiders are programs that traverse many pages in the World Wide Web by recursively retrieving linked pages. Search engines like Google, frequently spider web pages for indexing. How will you stop web spiders from crawling certain directories on your website?

A. Place robots.txt file in the root of your website with listing of directories that you don\’t want to be crawled

B. Place authentication on root directories that will prevent crawling from these spiders

C. Place “HTTP:NO CRAWL” on the html pages that you don\’t want the crawlers to index

D. Enable SSL on the restricted directories which will block these spiders from crawling

Correct Answer: A

WWW Robots (also called wanderers or spiders) are programs that traverse many pages in the World Wide Web by recursively retrieving linked pages. The method used to exclude robots from a server is to create a file on the server which

specifies an access policy for robots.

This file must be accessible via HTTP on the local URL “/robots.txt”.

http://www.robotstxt.org/orig.html#format


Question 4:

When a malicious hacker identifies a target and wants to eventually compromise this target, what would be the first step the attacker would perform?

A. Cover his tracks by eradicating the log files

B. Gain access to the remote computer for identification of venue of attacks

C. Perform a reconnaissance of the remote target for identification of venue of attacks

D. Always starts with a scan in order to quickly identify venue of attacks

Correct Answer: C


Question 5:

Lyle is a systems security analyst for Gusteffson and Sons, a large law firm in Beverly Hills. Lyle\’s responsibilities include network vulnerability scans, Antivirus monitoring, and IDS monitoring. Lyle receives a help desk call from a user in the Accounting department. This user reports that his computer is running very slow all day long and it sometimes gives him an error message that the hard drive is almost full. Lyle runs a scan on the computer with the company antivirus software and finds nothing. Lyle downloads another free antivirus application and scans the computer again. This time a virus is found on the computer. The infected files appear to be Microsoft Office files since they are in the same directory as that software. Lyle does some research and finds that this virus disguises itself as a genuine application on a computer to hide from antivirus software. What type of virus has Lyle found on this computer?

A. This type of virus that Lyle has found is called a cavity virus.

B. Lyle has discovered a camouflage virus on the computer.

C. By using the free antivirus software, Lyle has found a tunneling virus on the computer.

D. Lyle has found a polymorphic virus on this computer

Correct Answer: C


Question 6:

Google uses a unique cookie for each browser used by an individual user on a computer. This cookie contains information that allows Google to identify records about that user on its database. This cookie is submitted every time a user launches a Google search, visits a site using AdSense etc. The information stored in Google\’s database, identified by the cookie, includes

How would you prevent Google from storing your search keywords?

A. Block Google Cookie by applying Privacy and Security settings in your web browser

B. Disable the Google cookie using Google Advanced Search settings on Google Search page

C. Do not use Google but use another search engine Bing which will not collect and store your search keywords

D. Use MAC OS X instead of Windows 7. Mac OS has higher level of privacy controls by default.

Correct Answer: A


Question 7:

This attack uses social engineering techniques to trick users into accessing a fake Web site and divulging personal information. Attackers send a legitimate- looking e-mail asking users to update their information on the company\’s Web site, but the URLs in the e-mail actually point to a false Web site.

A. Wiresharp attack

B. Switch and bait attack

C. Phishing attack

D. Man-in-the-Middle attack

Correct Answer: C


Question 8:

You want to hide a secret.txt document inside c:\windows\system32\tcpip.dll kernel library using ADS streams. How will you accomplish this?

A. copy secret.txt c:\windows\system32\tcpip.dll kernel>secret.txt

B. copy secret.txt c:\windows\system32\tcpip.dll:secret.txt

C. copy secret.txt c:\windows\system32\tcpip.dll |secret.txt

D. copy secret.txt >< c:\windows\system32\tcpip.dll kernel secret.txt

Correct Answer: B


Question 9:

Attacking well-known system defaults is one of the most common hacker attacks. Most software is shipped with a default configuration that makes it easy to install and setup the application. You should change the default settings to secure the system.

Which of the following is NOT an example of default installation?

A. Many systems come with default user accounts with well-known passwords that administrators forget to change

B. Often, the default location of installation files can be exploited which allows a hacker to retrieve a file from the system

C. Many software packages come with “samples” that can be exploited, such as the sample programs on IIS web services

D. Enabling firewall and anti-virus software on the local system

Correct Answer: D


Question 10:

Harold works for Jacobson Unlimited in the IT department as the security manager. Harold has created a security policy requiring all employees to use complex 14 character passwords. Unfortunately, the members of management do not want to have to use such long complicated passwords so they tell Harold\’s boss this new password policy should not apply to them. To comply with the management\’s wishes, the IT department creates another Windows domain and moves all the management users to that domain. This new domain has a password policy only requiring 8 characters.

Harold is concerned about having to accommodate the managers, but cannot do anything about it. Harold is also concerned about using LanManager security on his network instead of NTLM or NTLMv2, but the many legacy applications on the network prevent using the more secure NTLM and NTLMv2. Harold pulls the SAM files from the DC\’s on the original domain and the new domain using Pwdump6.

Harold uses the password cracking software John the Ripper to crack users\’ passwords to make sure they are strong enough. Harold expects that the users\’ passwords in the original domain will take much longer to crack than the management\’s passwords in the new domain. After running the software, Harold discovers that the 14 character passwords only took a short time longer to crack than the 8 character passwords. Why did the 14 character passwords not take much longer to crack than the 8 character passwords?

A. Harold should have used Dumpsec instead of Pwdump6

B. Harold\’s dictionary file was not large enough

C. Harold should use LC4 instead of John the Ripper

D. LanManger hashes are broken up into two 7 character fields

Correct Answer: D


Question 11:

Fred is scanning his network to ensure it is as secure as possible. Fred sends a TCP probe packet to a host with a FIN flag and he receives a RST/ACK response. What does this mean?

A. This response means the port he is scanning is open.

B. The RST/ACK response means the port Fred is scanning is disabled.

C. This means the port he is scanning is half open.

D. This means that the port he is scanning on the host is closed.

Correct Answer: D


Question 12:

Attackers send an ACK probe packet with random sequence number, no response means port is filtered (Stateful firewall is present) and RST response means the port is not filtered. What type of Port Scanning is this?

A. RST flag scanning

B. FIN flag scanning

C. SYN flag scanning

D. ACK flag scanning

Correct Answer: D


Question 13:

Blane is a network security analyst for his company. From an outside IP, Blane performs an XMAS scan using Nmap. Almost every port scanned does not illicit a response. What can he infer from this kind of response?

A. These ports are open because they do not illicit a response.

B. He can tell that these ports are in stealth mode.

C. If a port does not respond to an XMAS scan using NMAP, that port is closed.

D. The scan was not performed correctly using NMAP since all ports, no matter what their state, will illicit some sort of response from an XMAS scan.

Correct Answer: A


Question 14:

Nathan is testing some of his network devices. Nathan is using Macof to try and flood the ARP cache of these switches. If these switches\’ ARP cache is successfully flooded, what will be the result?

A. The switches will drop into hub mode if the ARP cache is successfully flooded.

B. If the ARP cache is flooded, the switches will drop into pix mode making it less susceptible to attacks.

C. Depending on the switch manufacturer, the device will either delete every entry in its ARP cache or reroute packets to the nearest switch.

D. The switches will route all traffic to the broadcast address created collisions.

Correct Answer: A


Question 15:

You receive an e-mail like the one shown below. When you click on the link contained in the mail, you are redirected to a website seeking you to download free Anti-Virus software.

Dear valued customers,

We are pleased to announce the newest version of Antivirus 2010 for Windows which will probe you with total security against the latest spyware, malware, viruses, Trojans and other online threats. Simply visit the link below and enter your

antivirus code:

Antivirus code: 5014 http://www.juggyboy/virus/virus.html Thank you for choosing us, the worldwide leader Antivirus solutions.

Mike Robertson PDF Reader Support Copyright Antivirus 2010 ?All rights reserved If you want to stop receiving mail, please go to: http://www.juggyboy.com or you may contact us at the following address: Media Internet Consultants, Edif. Neptuno, Planta Baja, Ave. Ricardo J. Alfaro, Tumba Muerto, n/a Panama How will you determine if this is Real Anti-Virus or Fake Anti-Virus website?

A. Look at the website design, if it looks professional then it is a Real Anti-Virus website

B. Connect to the site using SSL, if you are successful then the website is genuine

C. Search using the URL and Anti-Virus product name into Google and lookout for suspicious warnings against this site

D. Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware

E. Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware

Correct Answer: C