Proper study guides for Most recent EC-Council Certified Ethical Hacker v8 certified begins with EC-Council 312-50v8 preparation products which designed to deliver the Exact 312-50v8 questions by making you pass the 312-50v8 test at your first time. Try the free 312-50v8 demo right now.

2021 Aug 312-50v8 rapidshare

Q91. What is the essential difference between an ‘Ethical Hacker’ and a ‘Cracker’? 

A. The ethical hacker does not use the same techniques or skills as a cracker. 

B. The ethical hacker does it strictly for financial motives unlike a cracker. 

C. The ethical hacker has authorization from the owner of the target. 

D. The ethical hacker is just a cracker who is getting paid. 

Answer: C 


Q92. Steve scans the network for SNMP enabled devices. Which port number Steve should scan? 


A. 150 

B. 161 

C. 169 

D. 69 

Answer: B 


Q93. Which method can provide a better return on IT security investment and provide a thorough and comprehensive assessment of organizational security covering policy, procedure design, and implementation? 

A. Penetration testing 

B. Social engineering 

C. Vulnerability scanning 

D. Access control list reviews 

Answer: A 


Q94. Bank of Timbuktu is a medium-sized, regional financial institution in Timbuktu. The bank has deployed a new Internet-accessible Web application recently. Customers can access their account balances, transfer money between accounts, pay bills and conduct online financial business using a Web browser. 

John Stevens is in charge of information security at Bank of Timbuktu. After one month in production, several customers have complained about the Internet enabled banking application. Strangely, the account balances of many of the bank's customers had been changed! However, money hasn't been removed from the bank; instead, money was transferred between accounts. Given this attack profile, John Stevens reviewed the Web application's logs and found the following entries: 


What kind of attack did the Hacker attempt to carry out at the bank? 

A. Brute force attack in which the Hacker attempted guessing login ID and password from password cracking tools. 

B. The Hacker attempted Session hijacking,in which the Hacker opened an account with the bank,then logged in to receive a session ID,guessed the next ID and took over Jason's session. 

C. The Hacker used a generator module to pass results to the Web server and exploited Web application CGI vulnerability. 

D. The Hacker first attempted logins with suspected user names,then used SQL Injection to gain access to valid bank login IDs. 

Answer: D 


Q95. There is some dispute between two network administrators at your company. Your boss asks you to come and meet with the administrators to set the record straight. Which of these are true about PKI and encryption? 

Select the best answers. 

A. PKI provides data with encryption,compression,and restorability. 

B. Public-key encryption was invented in 1976 by Whitfield Diffie and Martin Hellman. 

C. When it comes to eCommerce,as long as you have authenticity,and authenticity,you do not need encryption. 

D. RSA is a type of encryption. 

Answer: BD 


312-50v8 exam fees

Up to the minute 312-50v8 dumps:

Q96. You went to great lengths to install all the necessary technologies to prevent hacking 

attacks, such as expensive firewalls, antivirus software, anti-spam systems and intrusion detection/prevention tools in your company's network. You have configured the most secure policies and tightened every device on your network. You are confident that hackers will never be able to gain access to your network with complex security system in place. Your peer, Peter Smith who works at the same department disagrees with you. He says even the best network security technologies cannot prevent hackers gaining access to the network because of presence of "weakest link" in the security chain. What is Peter Smith talking about? 

A. Untrained staff or ignorant computer users who inadvertently become the weakest link in your security chain 

B. "zero-day" exploits are the weakest link in the security chain since the IDS will not be able to detect these attacks 

C. "Polymorphic viruses" are the weakest link in the security chain since the Anti-Virus scanners will not be able to detect these attacks 

D. Continuous Spam e-mails cannot be blocked by your security system since spammers use different techniques to bypass the filters in your gateway 

Answer: A 


Q97. Which one of the following is defined as the process of distributing incorrect Internet Protocol (IP) addresses/names with the intent of diverting traffic? 

A. Network aliasing 

B. Domain Name Server (DNS) poisoning 

C. Reverse Address Resolution Protocol (ARP) 

D. Port scanning 

Answer: B 


Q98. Which statement is.TRUE.regarding network firewalls preventing Web Application attacks? 

A. Network firewalls can prevent attacks because they can detect malicious HTTP traffic. 

B. Network firewalls cannot prevent attacks because ports 80 and 443 must be opened. 

C. Network firewalls can prevent attacks if they are properly configured. 

D. Network firewalls cannot prevent attacks because.they are.too complex to configure. 

Answer: B 


Q99. Ivan is auditing a corporate website. Using Winhex, he alters a cookie as shown below. 

Before Alteration: Cookie:; ADMIN=no; y=1 ; time=10:30GMT ; 

After Alteration: Cookie:; ADMIN=yes; y=1 ; time=12:30GMT ; 

What attack is being depicted here? 

A. Cookie Stealing 

B. Session Hijacking 

C. Cross Site Scripting 

D. Parameter Manipulation 

Answer: D 


Q100. Which type of scan measures a person's external features through a digital video camera? 

A. Iris scan 

B. Retinal scan 

C. Facial recognition scan 

D. Signature kinetics scan 

Answer: C