It is more faster and easier to pass the EC-Council 312-50 exam by using Precise EC-Council Ethical Hacking and Countermeasures (CEHv6) questuins and answers. Immediate access to the Up to the immediate present 312-50 Exam and find the same core area 312-50 questions with professionally verified answers, then PASS your exam with a high score now.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for EC-Council 312-50 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 312-50 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/312-50-exam-dumps.html

Q361. Sara is making use of Digest Authentication for her Web site. Why is this considered to be more secure than Basic authentication? 

A. Basic authentication is broken 

B. The password is never sent in clear text over the network 

C. The password sent in clear text over the network is never reused. 

D. It is based on Kerberos authentication protocol 

Answer: B

Explanation: Digest access authentication is one of the agreed methods a web page can use to negotiate credentials with a web user (using the HTTP protocol). This method builds upon (and obsoletes) the basic authentication scheme, allowing user identity to be established without having to send a password in plaintext over the network. 


Q362. Because UDP is a connectionless protocol: (Select 2) 

A. UDP recvfrom() and write() scanning will yield reliable results 

B. It can only be used for Connect scans 

C. It can only be used for SYN scans 

D. There is no guarantee that the UDP packets will arrive at their destination 

E. ICMP port unreachable messages may not be returned successfully 

Answer: DE

Explanation: Neither UDP packets, nor the ICMP errors are guaranteed to arrive, so UDP scanners must also implement retransmission of packets that appear to be lost (or you will get a bunch of false positives). 


Q363. Jimmy, an attacker, knows that he can take advantage of poorly designed input validation routines to create or alter SQL commands to gain access to private data or execute commands in the database. What technique does Jimmy use to compromise a database? 

A. Jimmy can submit user input that executes an operating system command to compromise a target system 

B. Jimmy can utilize this particular database threat that is an SQL injection technique to penetrate a target system 

C. Jimmy can utilize an incorrect configuration that leads to access with higher-than-expected privilege of the database 

D. Jimmy can gain control of system to flood the target system with requests, preventing legitimate users from gaining access 

Answer: B

Explanation: SQL injection is a security vulnerability that occurs in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is in fact an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another. 


Q364. Which of the following best describes session key creation in SSL? 

A. It is created by the server after verifying theuser's identity 

B. It is created by the server upon connection by the client 

C. It is created by the client from the server's public key 

D. It is created by the client after verifying the server's identity 

Answer: D

Explanation: An SSL session always begins with an exchange of messages called the SSL handshake. The handshake allows the server to authenticate itself to the client using public-key techniques, then allows the client and the server to cooperate in the creation of symmetric keys used for rapid encryption, decryption, and tamper detection during the session that follows. Optionally, the handshake also allows the client to authenticate itself to the server. 


Q365. Jane has just accessed her preferred e-commerce web site and she has seen an item she would like to buy. Jane considers the price a bit too steep; she looks at the page source code and decides to save the page locally to modify some of the page variables. In the context of web application security, what do you think Jane has changed? 

A. An integer variable 

B. A 'hidden' price value 

C. A 'hidden' form field value 

D. A page cannot be changed locally; it can only be served by a web server 

Answer: C

Explanation: Changing hidden form values is possible when a web site is poorly built and is trusting the visitors computer to submit vital data, like the price of a product, to the database. 


Q366. If you receive a RST packet while doing an ACK scan, it indicates that the port is open.(True/False). 

A. True 

B. False 

Answer:

Explanation: When and ACK is sent to an open port, a RST is returned. 


Q367. ou are gathering competitive intelligence on ABC.com. You notice that they have jobs 

listed on a few Internet job-hunting sites. There are two job postings for network and system administrators. How can this help you in footprint the organization? 

A. The IP range used by the target network 

B. An understanding of the number of employees in the company 

C. How strong the corporate security policy is 

D. The types of operating systems and applications being used. 

Answer: D

Explanation: From job posting descriptions one can see which is the set of skills, technical knowledge, system experience required, hence it is possible to argue what kind of operating systems and applications the target organization is using. 


Q368. You are conducting an idlescan manually using HPING2. During the scanning process, you notice that almost every query increments the IPID- regardless of the port being queried. One or two of the queries cause the IPID to increment by more than one value. Which of he following options would be a possible reason? 

A. Hping2 can’t be used for idlescanning 

B. The Zombie you are using is not truly idle 

C. These ports are actually open on the target system 

D. A stateful inspection firewall is resetting your queries 

Answer: B

Explanation: If the IPID increments more than one value that means that there has been network traffic between the queries so the zombie is not idle. 


Q369. Bob is conducting a password assessment for one of his clients. Bob suspects that password policies are not in place and weak passwords are probably the norm throughout the company he is evaluating. Bob is familiar with password weakness and key loggers. What are the means that Bob can use to get password from his client hosts and servers? 

A. Hardware, Software and Sniffing 

B. Hardware and Software Keyloggers 

C. Software only, they are the most effective 

D. Passwords are always best obtained using Hardware key loggers 

Answer:

Explanation: All loggers will work as long as he has physical access to the computers. 

Topic 8, Denial of Service 

275. The evil hacker, is purposely sending fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes. From the information given, what type of attack is attempting to perform? 

A. Syn flood 

B. Smurf 

C. Ping of death 

D. Fraggle 

Answer:

Reference: http://insecure.org/sploits/ping-o-death.html 


Q370. Which of the following statement correctly defines ICMP Flood Attack? (Select 2 answers) A. Bogus ECHO reply packets are flooded on the network spoofing the IP and MAC address 

B. The ICMP packets signal the victim system to reply and the combination of traffic saturates the bandwidth of the victim's network 

C. ECHO packets are flooded on the network saturating the bandwidth of the subnet causing denial of service 

D. A DDoS ICMP flood attack occurs when the zombies send large volumes of ICMP_ECHO_REPLY packets to the victim system. 

Answer: BD