Cause all that matters here is passing the EC-Council 312-50v8 exam. Cause all that you need is a high score of 312-50v8 Certified Ethical Hacker v8 exam. The only one thing you need to do is downloading Ucertify 312-50v8 exam study guides now. We will not let you down with our money-back guarantee.

2021 Sep 312-50v8 free exam

Q31. You want to perform advanced SQL Injection attack against a vulnerable website. You are unable to perform command shell hacks on this server. What must be enabled in SQL Server to launch these attacks? 

A. System services 

B. EXEC master access 

C. xp_cmdshell 

D. RDC 

Answer: C 


Q32. What is the best means of prevention against viruses? 

A. Assign read only permission to all files on your system. 

B. Remove any external devices such as floppy and USB connectors. 

C. Install a rootkit detection tool. 

D. Install and update anti-virus scanner. 

Answer: D 


Q33. In this type of Man-in-the-Middle attack, packets and authentication tokens are captured using a sniffer. Once the relevant information is extracted, the tokens are placed back on the network to gain access. 


A. Token Injection Replay attacks 

B. Shoulder surfing attack 

C. Rainbow and Hash generation attack 

D. Dumpster diving attack 

Answer: A 


Q34. Peter is a Network Admin. He is concerned that his network is vulnerable to a smurf attack. What should Peter do to prevent a smurf attack? 

Select the best answer. 

A. He should disable unicast on all routers 

B. Disable multicast on the router 

C. Turn off fragmentation on his router 

D. Make sure all anti-virus protection is updated on all systems 

E. Make sure his router won't take a directed broadcast 

Answer: E 


Q35. SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long been used by hackers to gather great amount of information about remote hosts. 

Which of the following features makes this possible? (Choose two) 

A. It used TCP as the underlying protocol. 

B. It uses community string that is transmitted in clear text. 

C. It is susceptible to sniffing. 

D. It is used by all network devices on the market. 

Answer: BD 


312-50v8 exam cost

Renovate 312-50v8 practice exam:

Q36. In the software security development life cyle process, threat modeling occurs in which phase? 

A. Design 

B. Requirements 

C. Verification 

D. Implementation 

Answer: A 


Q37. A hacker is attempting to see which ports have been left open on a network. Which NMAP switch would the hacker use? 

A. -sO 

B. -sP 

C. -sS 

D. -sU 

Answer: A 


Q38. The programmers on your team are analyzing the free, open source software being used to run FTP services on a server. They notice that there is an excessive number of fgets() and gets() on the source code. These C++ functions do not check bounds. 

What kind of attack is this program susceptible to? 

A. Buffer of Overflow 

B. Denial of Service 

C. Shatter Attack 

D. Password Attack 

Answer: A 


Q39. In keeping with the best practices of layered security, where are the best places to place intrusion detection/intrusion prevention systems? (Choose two.) 

A. HID/HIP (Host-based Intrusion Detection/Host-based Intrusion Prevention) 

B. NID/NIP (Node-based Intrusion Detection/Node-based Intrusion Prevention) 

C. NID/NIP (Network-based Intrusion Detection/Network-based Intrusion Prevention) 

D. CID/CIP (Computer-based Intrusion Detection/Computer-based Intrusion Prevention) 

Answer: AC 


Q40. Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack? 

A. Teardrop 

B. Smurf 

C. Ping of Death 

D. SYN flood 

E. SNMP Attack 

Answer: A