The Actualtests EC-Council 312-50 simulation analyze study guidebook covers all the crucial contents of the EC-Council 312-50 certification program. The EC-Council EC-Council 312-50 exam questions are generally upgraded timely in line with your latest genuine exam. We guarantee you a new reliable, current, real EC-Council 312-50 training analyze, which creates a great outstanding real EC-Council EC-Council 312-50 testing atmosphere. Youll be able to utilize your EC-Council EC-Council 312-50 study guidebook more than one particular time and make several alteration according to your own personal needs. You may be able to very easily pass the EC-Council EC-Council 312-50 quiz without having any kind of trouble. Our newest Actualtests EC-Council EC-Council practice exam questions make your own skills extremely sharp and provide you with a vast understanding. Actualtests offers several EC-Council EC-Council 312-50 practice exam questions and answers regarding all test-takers through the elementary level towards the advanced stage. Be one of those who acquire their EC-Council EC-Council certification just by a new click with Actualtests, you will always be very proud. The particular EC-Council certification must be a great advantage for you to be able to compete a high-paying task with others.
2021 Sep 312-50 book
Q111. Bart is looking for a Windows NT/2000/XP command-line tool that can be used to assign, display, or modify ACL’s (access control lists) to files or folders and also one that can be used within batch files.
Which of the following tools can be used for that purpose? (Choose the best answer)
A. PERM.exe
B. CACLS.exe
C. CLACS.exe
D. NTPERM.exe
Answer: B
Explanation: Cacls.exe is a Windows NT/2000/XP command-line tool you can use to assign, display, or modify ACLs (access control lists) to files or folders. Cacls is an interactive tool, and since it's a command-line utility, you can also use it in batch files.
Q112. Which type of attack is port scanning?
A. Web server attack
B. Information gathering
C. Unauthorized access
D. Denial of service attack
Answer: B
Q113. You want to know whether a packet filter is in front of 192.168.1.10. Pings to 192.168.1.10 don't get answered. A basic nmap scan of 192.168.1.10 seems to hang without returning any information. What should you do next?
A. Use NetScan Tools Pro to conduct the scan
B. Run nmap XMAS scan against 192.168.1.10
C. Run NULL TCP hping2 against 192.168.1.10
D. The firewall is blocking all the scans to 192.168.1.10
Answer: C
Q114. Which port, when configured on a switch receives a copy of every packet that passes through it?
A. R-DUPE Port
B. MIRROR port
C. SPAN port
D. PORTMON
Answer: C
Q115. Bob wants to prevent attackers from sniffing his passwords on the wired network. Which of the following lists the best options?
A. RSA, LSA, POP
B. SSID, WEP, Kerberos
C. SMB, SMTP, Smart card
D. Kerberos, Smart card, Stanford SRP
Answer: D
Explanation: Kerberos, Smart cards and Stanford SRP are techniques where the password never leaves the computer.

Abreast of the times 312-50 pdf exam:
Q116. When a malicious hacker identifies a target and wants to eventually compromise this target, what would be the first step the attacker would perform?
A. Cover his tracks by eradicating the log files
B. Gain access to the remote computer for identification of venue of attacks
C. Perform a reconnaissance of the remote target for identification of venue of attacks
D. Always starts with a scan in order to quickly identify venue of attacks
Answer: C
Q117. Consider the following code:
If an attacker can trick a victim user to click a link like this and the web application does not validate input, then the victim’s browser will pop up an alert showing the users current set of cookies. An attacker can do much more damage, including stealing passwords, resetting your home page or redirecting the user to another web site.
What is the countermeasure against XSS scripting?
A. Create an IP access list and restrict connections based on port number
B. Replace “<” and “>” characters with ?lt; and ?gt; using server scripts
C. Disable Javascript in IE and Firefox browsers
D. Connect to the server using HTTPS protocol instead of HTTP
Answer: B
Explanation: The correct answer contains a string which is an HTML-quoted version of the original script. The quoted versions of these characters will appear as literals in a browser, rather than with their special meaning as HTML tags. This prevents any script from being injected into HTML output, but it also prevents any user-supplied input from being formatted with benign HTML.
Topic 13, Web Based Password Cracking Techniques
Q118. When working with Windows systems, what is the RID of the true administrator account?
A. 500
B. 501
C. 1000
D. 1001
E. 1024
F. 512
Answer: A
Explanation: Because of the way in which Windows functions, the true administrator account always has a RID of 500.
Q119. What does the following command in "Ettercap" do?
ettercap –NCLzs –quiet
A. This command will provide you the entire list of hosts in the LAN
B. This command will check if someone is poisoning you and will report its IP
C. This command will detach ettercap from console and log all the sniffed passwords to a file
D. This command broadcasts ping to scan the LAN instead of ARP request all the subset IPs
Answer: C
Explanation: -L specifies that logging will be done to a binary file and –s tells us it is running in script mode.
Q120. What tool can crack Windows SMB passwords simply by listening to network traffic?
Select the best answer.
A. This is not possible
B. Netbus
C. NTFSDOS
D. L0phtcrack
Answer: D
Explanations:
This is possible with a SMB packet capture module for L0phtcrack and a known weaknesses in the LM hash algorithm.