certified ethical hacker exam 312-50 pdf (361 to 370)

♥♥ 2017 NEW RECOMMEND ♥♥

Free VCE & PDF File for EC-Council 312-50 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 312-50 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/312-50-dumps.html

312-50 Product Description:
Exam Number/Code: 312-50 vce
Exam name: Ethical Hacking and Countermeasures (CEHv6)
n questions with full explanations
Certification: EC-Council Certification
Last updated on Global synchronizing

Instant Access to Free VCE Files: EC-Council 312-50 Ethical Hacking and Countermeasures (CEHv6)

312-50 examcollection

The actual examinees who read the Ucertify EC-Council 312-50 puts tend to be success of very licensed teachers, dwelling a great life. Ucertify continues to be committed to build your potential protected and commence the EC-Council 312-50 Ethical Hacking and Countermeasures (CEHv6) examination products through the newest up-to-date Ucertify checks 312-50 test motor. The desires can come true by start the 312-50 vce with regard to Ethical Hacking and Countermeasures (CEHv6) examination by means of Ucertify EC-Council research instructions simply. Youll not in a position to shine your talent in the first try of 312-50 test if you utilize a other path compared to EC-Council. EC-Council EC-Council 312-50 pdf file provides you with beauty therefore making you adequate certain about your entire life.

2016 Jun certified ethical hacker exam 312-50 pdf:

Q361. In which location, SAM hash passwords are stored in Windows 7? 

A. c:\windows\system32\config\SAM 

B. c:\winnt\system32\machine\SAM 

C. c:\windows\etc\drivers\SAM 

D. c:\windows\config\etc\SAM 

Answer: A

Q362. Which of these are phases of a reverse social engineering attack? 

Select the best answers. 

A. Sabotage 

B. Assisting 

C. Deceiving 

D. Advertising 

E. Manipulating 

Answer: ABD


According to "Methods of Hacking: Social Engineering", by Rick Nelson, the three phases of reverse social engineering attacks are sabotage, advertising, and assisting. 

Q363. What does black box testing mean? 

A. You have full knowledge of the environment 

B. You have no knowledge of the environment 

C. You have partial knowledge of the environment 

Answer: B

Explanation: Black box testing is conducted when you have no knowledge of the environment. It is more time consuming and expensive. 

Q364. Dave has been assigned to test the network security of Acme Corp. The test was announced to the employees. He created a webpage to discuss the progress of the tests with employees who were interested in following the test. Visitors were allowed to click on a sand clock to mark the progress of the test. Dave successfully embeds a keylogger. He also added some statistics on the webpage. The firewall protects the network well and allows strict Internet access. How was security compromised and how did the firewall respond? 

A. The attack did not fall through as the firewall blocked the traffic 

B. The attack was social engineering and the firewall did not detect it 

C. The attack was deception and security was not directly compromised 

D. Security was not compromised as the webpage was hosted internally 

Answer: B

Explanation: This was just another way to trick the information out of the users without the need to hack into any systems. All traffic is outgoing and initiated by the user so the firewall will not react. 

Q365. What did the following commands determine? 

C : user2sid \earth guest S-1-5-21-343818398-789336058-1343024091-501 

C:sid2user 5 21 343818398 789336058 1343024091 500 Name is Joe Domain is EARTH 

A. That the Joe account has a SID of 500 

B. These commands demonstrate that the guest account has NOT been disabled 

C. These commands demonstrate that the guest account has been disabled 

D. That the true administrator is Joe 

E. Issued alone, these commands prove nothing 

Answer: D

Explanation: One important goal of enumeration is to determine who the true administrator is. In the example above, the true administrator is Joe. 

312-50  exam question

Most recent ethical hacking and countermeasures exam 312-50:

Q366. Peter extracts the SID list from Windows 2008 Server machine using the hacking tool "SIDExtracter". Here is the output of the SIDs: 

From the above list identify the user account with System Administrator privileges? 

A. John 

B. Rebecca 

C. Sheela 

D. Shawn 

E. Somia 

F. Chang 

G. Micah 

Answer: F

Q367. Which port, when configured on a switch receives a copy of every packet that passes through it? 

A. R-DUPE Port 

B. MIRROR port 

C. SPAN port 


Answer: C

Q368. What does a type 3 code 13 represent?(Choose two. 

A. Echo request 

B. Destination unreachable 

C. Network unreachable 

D. Administratively prohibited 

E. Port unreachable 

F. Time exceeded 

Answer: BD

Explanation: Type 3 code 13 is destination unreachable administratively prohibited. This type of message is typically returned from a device blocking a port. 

Q369. Bill is a security analyst for his company. All the switches used in the company's office are Cisco switches. Bill wants to make sure all switches are safe from ARP poisoning. How can Bill accomplish this? 

A. Bill can use the command: ip dhcp snooping. 

B. Bill can use the command: no ip snoop. 

C. Bill could use the command: ip arp no flood. 

D. He could use the command: ip arp no snoop. 

Answer: A

Q370. What is the proper response for a X-MAS scan if the port is closed? 






F. No response 

Answer: E 

Explanation: Closed ports respond to a X-MAS scan with a RST. 

see more Ethical Hacking and Countermeasures (CEHv6)