Precise of 312-50v8 book materials and torrent for EC-Council certification for candidates, Real Success Guaranteed with Updated 312-50v8 pdf dumps vce Materials. 100% PASS Certified Ethical Hacker v8 exam Today!

2021 Aug 312-50v8 rapidshare

Q361. Lauren is performing a network audit for her entire company. The entire network is comprised of around 500 computers. Lauren starts an ICMP ping sweep by sending one IP packet to the broadcast address of the network, but only receives responses from around five hosts. Why did this ping sweep only produce a few responses? 

A. Only Windows systems will reply to this scan. 

B. A switched network will not respond to packets sent to the broadcast address. 

C. Only Linux and Unix-like (Non-Windows) systems will reply to this scan. 

D. Only servers will reply to this scan. 

Answer: C 


Q362. Leesa is the senior security analyst for a publicly traded company. The IT department recently rolled out an intranet for company use only with information ranging from training, to holiday schedules, to human resources data. Leesa wants to make sure the site is not accessible from outside and she also wants to ensure the site is Sarbanes-Oxley (SOX) compliant. Leesa goes to a public library as she wants to do some Google searching to verify whether the company's intranet is accessible from outside and has been indexed by Google. Leesa wants to search for a website title of "intranet" with part of the URL containing the word "intranet" and the words "human resources" somewhere in the webpage. 

What Google search will accomplish this? 

A. related:intranet allinurl:intranet:"human resources" 

B. cache:"human resources" inurl:intranet(SharePoint) 

C. intitle:intranet inurl:intranet+intext:"human resources" 

D. site:"human resources"+intext:intranet intitle:intranet 

Answer: C 


Q363. Which of the following is NOT part of CEH Scanning Methodology? 

A. Check for Live systems 

B. Check for Open Ports C. Banner Grabbing 

D. Prepare Proxies 

E. Social Engineering attacks 

F. Scan for Vulnerabilities 

G. Draw Network Diagrams 

Answer: E 


Q364. What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall if your network is comprised of Windows NT, 2000, and XP?(Choose all that apply. 

A. 110 

B. 135 

C. 139 

D. 161 

E. 445 

F. 1024 

Answer: BCE 


Q365. What is the main advantage that a network-based IDS/IPS system has over a host-based solution? 

A. They do not use host system resources. 

B. They are placed at the boundary,allowing them to inspect all traffic. 

C. They are easier to install and configure. 

D. They will not interfere with user interfaces. 

Answer: A 


312-50v8 braindumps

Renovate 312-50v8 vce:

Q366. Network Intrusion Detection systems can monitor traffic in real time on networks. 

Which one of the following techniques can be very effective at avoiding proper detection? 

A. Fragmentation of packets. 

B. Use of only TCP based protocols. 

C. Use of only UDP based protocols. 

D. Use of fragmented ICMP traffic only. 

Answer: A 


Q367. Which of the following is the best way an attacker can passively learn about technologies used in an organization? 

A. By sending web bugs to key personnel 

B. By webcrawling the organization web site 

C. By searching regional newspapers and job databases for skill sets technology hires need to possess in the organization 

D. By performing a port scan on the organization's web site 

Answer: C 


Q368. When working with Windows systems, what is the RID of the true administrator account? 

A. 500 

B. 501 

C. 512 

D. 1001 

E. 1024 

F. 1000 

Answer: A 


Q369. NTP allows you to set the clocks on your systems very accurately, to within 100ms and sometimes-even 10ms. Knowing the exact time is extremely important for enterprise security. Various security protocols depend on an accurate source of time information in order to prevent "playback" attacks. These protocols tag their communications with the current time, to prevent attackers from replaying the same communications, e.g., a login/password interaction or even an entire communication, at a later date. One can circumvent this tagging, if the clock can be set back to the time the communication was recorded. An attacker attempts to try corrupting the clocks on devices on your network. You run Wireshark to detect the NTP traffic to see if there are any irregularities on the network. What port number you should enable in Wireshark display filter to view NTP packets? 

A. TCP Port 124 

B. UDP Port 125 

C. UDP Port 123 

D. TCP Port 126 

Answer: C 


Q370. Password cracking programs reverse the hashing process to recover passwords.(True/False. 

A. True 

B. False 

Answer: B