It is more faster and easier to pass the EC-Council 312-50v8 exam by using Highest Quality EC-Council Certified Ethical Hacker v8 questuins and answers. Immediate access to the Far out 312-50v8 Exam and find the same core area 312-50v8 questions with professionally verified answers, then PASS your exam with a high score now.
2021 Sep 312-50v8 exam topics
Q341. Firewalk has just completed the second phase (the scanning phase) and a technician receives the output shown below. What conclusions can be drawn based on these scan results?.TCP port 21 – no response.TCP port 22 – no response.TCP port 23 – Time-to-live exceeded
A. The firewall itself is blocking ports 21 through 23 and a service is listening on port 23 of the target host.
B. The lack of response from ports 21 and 22 indicate that those services are not running on the destination server.
C. The scan on port 23 passed through the filtering device. This indicates that port 23 was not blocked at the firewall.
D. The scan on port 23 was able to make a connection to the destination host prompting the firewall to respond with a TTL error.
Answer: C
Q342. How does traceroute map the route a packet travels from point A to point B?
A. Uses a TCP timestamp packet that will elicit a time exceeded in transit message
B. Manipulates the value of the time to live (TTL) within packet to elicit a time exceeded in transit message
C. Uses a protocol that will be rejected by gateways on its way to the destination
D. Manipulates the flags within packets to force gateways into generating error messages
Answer: B
Q343. What are the three types of compliance that the.Open Source Security Testing Methodology Manual (OSSTMM) recognizes?
A. Legal,performance,audit
B. Audit,standards based,regulatory
C. Contractual,regulatory,industry
D. Legislative,contractual,standards based
Answer: D
Q344. Which of the following.statements.are true regarding N-tier architecture? (Choose two.)
A. Each layer must be able to exist on a physically independent system.
B. The N-tier architecture must have at least one logical layer.
C. Each layer should exchange information only with the layers above and below it..
D. When a layer is changed or updated,the other layers must.also be.recompiled or modified.
Answer: AC
Q345. Simon is security analyst writing signatures for a Snort node he placed internally that captures all mirrored traffic from his border firewall. From the following signature, what will Snort look for in the payload of the suspected packets?
alert tcp $EXTERNAL_NET any -> $HOME_NET 27374 (msG. "BACKDOOR SIG -SubSseven 22";flags: A+; content: "|0d0a5b52504c5d3030320d0a|"; reference:arachnids, 485;) alert
A. The payload of 485 is what this Snort signature will look for.
B. Snort will look for 0d0a5b52504c5d3030320d0a in the payload.
C. Packets that contain the payload of BACKDOOR SIG - SubSseven 22 will be flagged.
D. From this snort signature,packets with HOME_NET 27374 in the payload will be flagged.
Answer: B
Avant-garde 312-50v8 pdf exam:
Q346. Which of the following represents the initial two commands that an IRC client sends to join an IRC network?
A. USER,NICK
B. LOGIN,NICK
C. USER,PASS
D. LOGIN,USER
Answer: A
Q347. Information gathered from social networking websites such as Facebook, Twitter and
LinkedIn can be used to launch which of the following types of attacks? (Choose two.)
A. Smurf attack
B. Social engineering attack
C. SQL injection attack
D. Phishing attack
E. Fraggle attack
F. Distributed denial of service attack
Answer: B,D
Q348. Exhibit
(Note: the student is being tested on concepts learnt during passive OS fingerprinting, basic TCP/IP connection concepts and the ability to read packet signatures from a sniff dump.)
Snort has been used to capture packets on the network. On studying the packets, the penetration tester finds it to be abnormal. If you were the penetration tester, why would you find this abnormal?
What is odd about this attack? Choose the best answer.
A. This is not a spoofed packet as the IP stack has increasing numbers for the three flags.
B. This is back orifice activity as the scan comes form port 31337.
C. The attacker wants to avoid creating a sub-carries connection that is not normally valid.
D. These packets were crafted by a tool,they were not created by a standard IP stack.
Answer: B
Q349. What sequence of packets is sent during the initial TCP three-way handshake?
A. SYN,SYN-ACK,ACK
B. SYN,URG,ACK
C. SYN,ACK,SYN-ACK
D. FIN,FIN-ACK,ACK
Answer: A
Q350. What type of encryption does WPA2 use?
A. DES 64 bit
B. AES-CCMP 128 bit
C. MD5 48 bit
D. SHA 160 bit
Answer: B