Master the 312-50 Ethical Hacking and Countermeasures (CEHv6) content and be ready for exam day success quickly with this Testking 312-50 vce. We guarantee it!We make it a reality and give you real 312-50 questions in our EC-Council 312-50 braindumps.Latest 100% VALID EC-Council 312-50 Exam Questions Dumps at below page. You can use our EC-Council 312-50 braindumps and pass your exam.

Q196. You want to know whether a packet filter is in front of Pings to don't get answered. A basic nmap scan of seems to hang without returning any information. What should you do next? 

A. Use NetScan Tools Pro to conduct the scan 

B. Run nmap XMAS scan against 

C. Run NULL TCP hping2 against 

D. The firewall is blocking all the scans to 

Answer: C

Q197. Statistics from and other leading security organizations has clearly showed a steady rise in the number of hacking incidents perpetrated against companies. 

What do you think is the main reason behind the significant increase in hacking attempts over the past years? 

A. It is getting more challenging and harder to hack for non technical people. 

B. There is a phenomenal increase in processing power. 

C. New TCP/IP stack features are constantly being added. 

D. The ease with which hacker tools are available on the Internet. 


Explanation: Today you don’t need to be a good hacker in order to break in to various systems, all you need is the knowledge to use search engines on the internet. 

Q198. One of your team members has asked you to analyze the following SOA record. What is the TTL? (200302028 3600 3600 604800 2400. 

A. 200303028 

B. 3600 

C. 604800 

D. 2400 

E. 60 

F. 4800 

Answer: D

Explanation: The SOA includes a timeout value. This value can tell an attacker how long any DNS "poisoning" would last. It is the last set of numbers in the record. 

Q199. What are the two basic types of attacks?(Choose two. 

A. DoS 

B. Passive 

C. Sniffing 

D. Active 

E. Cracking 

Answer: BD 

Explanation: Passive and active attacks are the two basic types of attacks. 

Q200. Which one of the following instigates a SYN flood attack? 

A. Generating excessive broadcast packets. 

B. Creating a high number of half-open connections. 

C. Inserting repetitive Internet Relay Chat (IRC) messages. 

D. A large number of Internet Control Message Protocol (ICMP) traces. 

Answer: B

Explanation: A SYN attack occurs when an attacker exploits the use of the buffer space during a Transmission Control Protocol (TCP) session initialization handshake. The attacker floods the target system's small "in-process" queue with connection requests, but it does not respond when a target system replies to those requests. This causes the target system to time out while waiting for the proper response, which makes the system crash or become unusable. 

Q201. Pandora is used to attack __________ network operating systems. 

A. Windows 


C. Linux 

D. Netware 


Answer: D

Explanation: While there are not lots of tools available to attack Netware, Pandora is one that can be used. 

Q202. Vulnerability mapping occurs after which phase of a penetration test? 

A. Host scanning 

B. Passive information gathering 

C. Analysis of host scanning 

D. Network level discovery 

Answer: C

Explanation: The order should be Passive information gathering, Network level discovery, Host scanning and Analysis of host scanning. 

Q203. How would you permanently wipe the data in the hard disk? 

A. wipe -fik /dev/hda1 

B. erase -fik /dev/hda1 

C. delete -fik /dev/hda1 

D. secdel -fik /dev/hda1 

Answer: A

Q204. In which part of OSI layer, ARP Poisoning occurs? 

A. Transport Layer 

B. Datalink Layer 

C. Physical Layer 

D. Application layer 

Answer: B

Q205. What attack is being depicted here? 

A. Cookie Stealing 

B. Session Hijacking 

C. Cross Site scripting 

D. Parameter Manipulation 

Answer: D

Explanation: Manipulating the data sent between the browser and the web application to an attacker's advantage has long been a simple but effective way to make applications do things in a way the user often shouldn't be able to. In a badly designed and developed web application, malicious users can modify things like prices in web carts, session tokens or values stored in cookies and even HTTP headers. In this case the user has elevated his rights. 

Q206. What is the problem with this ASP script (login.asp)? 


Set objConn = CreateObject("ADODB.Connection") 

objConn.Open Application("WebUsersConnection") 

sSQL="SELECT * FROM Users where Username=? & Request("user") & _ 

"?and Password=? & Request("pwd") & "? 

Set RS = objConn.Execute(sSQL) 

If RS.EOF then Response.Redirect("login.asp?msg=Invalid Login") Else Session.Authorized = True 

Set RS = nothing 

Set objConn = nothing Response.Redirect("mainpage.asp") End If %> 

A. The ASP script is vulnerable to XSS attack 

B. The ASP script is vulnerable to SQL Injection attack 

C. The ASP script is vulnerable to Session Splice attack 

D. The ASP script is vulnerable to Cross Site Scripting attack 

Answer: B

Q207. What does the term “Ethical Hacking” mean? 

A. Someone who is hacking for ethical reasons. 

B. Someone who is using his/her skills for ethical reasons. 

C. Someone who is using his/her skills for defensive purposes. 

D. Someone who is using his/her skills for offensive purposes. 

Answer: C

Explanation: Ethical hacking is only about defending your self or your employer against malicious persons by using the same techniques and skills. 

Q208. Consider the following code: 

If an attacker can trick a victim user to click a link like this and the web application does not validate input, then the victim’s browser will pop up an alert showing the users current set of cookies. An attacker can do much more damage, including stealing passwords, resetting your home page or redirecting the user to another web site. 

What is the countermeasure against XSS scripting? 

A. Create an IP access list and restrict connections based on port number 

B. Replace “<” and “>” characters with ?lt; and ?gt; using server scripts 

C. Disable Javascript in IE and Firefox browsers 

D. Connect to the server using HTTPS protocol instead of HTTP 

Answer: B

Explanation: The correct answer contains a string which is an HTML-quoted version of the original script. The quoted versions of these characters will appear as literals in a browser, rather than with their special meaning as HTML tags. This prevents any script from being injected into HTML output, but it also prevents any user-supplied input from being formatted with benign HTML. 

Topic 13, Web Based Password Cracking Techniques 

Q209. You have been called to investigate a sudden increase in network traffic at company. It seems that the traffic generated was too heavy that normal business functions could no longer be rendered to external employees and clients. After a quick investigation, you find that the computer has services running attached to TFN2k and Trinoo software. What do you think was the most likely cause behind this sudden increase in traffic? 

A. A distributed denial of service attack. 

B. A network card that was jabbering. 

C. A bad route on the firewall. 

D. Invalid rules entry at the gateway. 

Answer: A

Explanation: In computer security, a denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended users. Typically the targets are high-profile web servers, and the attack attempts to make the hosted web pages unavailable on the Internet. It is a computer crime that violates the Internet proper use policy as indicated by the Internet Architecture Board (IAB). TFN2K and Trinoo are tools used for conducting DDos attacks. 

Q210. Steve scans the network for SNMP enabled devices. Which port number Steve should scan? 

A. 69 

B. 150 

C. 161 

D. 169 

Answer: C

Explanation: The SNMP default port is 161. Port 69 is used for tftp, 150 is for SQL-NET and 169 is for SEND.