Proper study guides for Down to date EC-Council Certified Ethical Hacker v8 certified begins with EC-Council 312-50v8 preparation products which designed to deliver the Validated 312-50v8 questions by making you pass the 312-50v8 test at your first time. Try the free 312-50v8 demo right now.

2021 Sep 312-50v8 exam engine

Q241. ETHER: Destination address : 0000BA5EBA11 ETHER: Source address : 


An employee wants to defeat detection by a network-based IDS application. He does not want to attack the system containing the IDS application. Which of the following strategies can be used to defeat detection by a network-based IDS application? 

A. Create a SYN flood 

B. Create a network tunnel 

C. Create multiple false positives 

D. Create a ping flood 

Answer: B 


Q242. Vulnerability scanners are automated tools that are used to identify vulnerabilities and misconfigurations of hosts. They also provide information regarding mitigating discovered vulnerabilities. 


Which of the following statements is incorrect? 

A. Vulnerability scanners attempt to identify vulnerabilities in the hosts scanned. 

B. Vulnerability scanners can help identify out-of-date software versions,missing patches,or system upgrades 

C. They can validate compliance with or deviations from the organization's security policy 

D. Vulnerability scanners can identify weakness and automatically fix and patch the vulnerabilities without user intervention 

Answer: D 


Q243. NSLookup is a good tool to use to gain additional information about a target network. What does the following command accomplish? 

nslookup 

> server <ipaddress> 

> set type =any 

> ls -d <target.com> 

A. Enables DNS spoofing 

B. Loads bogus entries into the DNS table 

C. Verifies zone security 

D. Performs a zone transfer 

E. Resets the DNS cache 

Answer: D 


Q244. What type of attack changes its signature and/or payload to avoid detection by antivirus programs? 

A. Polymorphic 

B. Rootkit 

C. Boot sector 

D. File infecting 

Answer: A 


Q245. A recently hired network security associate at a local bank was given the responsibility to perform daily scans of the internal network to look for unauthorized devices. The employee decides to write a script that will scan the network for unauthorized devices every morning at 5:00 am. 

Which of the following programming languages would most likely be used? 

A. PHP 

B. C# 

C. Python 

D. ASP.NET 

Answer: C 


312-50v8 exam guide

Down to date 312-50v8 free exam questions:

Q246. The precaution of prohibiting employees from bringing personal computing devices into a facility is what type of security control? 

A. Physical 

B. Procedural 

C. Technical 

D. Compliance.

Answer: B 


Q247. File extensions provide information regarding the underlying server technology. Attackers can use this information to search vulnerabilities and launch attacks. How would you disable file extensions in Apache servers? 

A. Use disable-eXchange 

B. Use mod_negotiation 

C. Use Stop_Files 

D. Use Lib_exchanges 

Answer: B 


Q248. Employees in a company are no longer able to access Internet web sites on their computers. The network administrator is able to successfully ping IP address of web servers on the Internet and is able to open web sites by using an IP address in place of the URL..The administrator runs the nslookup command for www.eccouncil.org and receives an error message stating there is no response from the server. What should the administrator do next? 

A. Configure the firewall to allow traffic on TCP ports 53 and UDP port 53. 

B. Configure the firewall to allow traffic on TCP ports 80 and UDP port 443. 

C. Configure the firewall to allow traffic on TCP port 53. 

D. Configure the firewall to allow traffic on TCP port 8080. 

Answer: A 


Q249. Jack Hacker wants to break into Brown Co.'s computers and obtain their secret double fudge cookie recipe. Jack calls Jane, an accountant at Brown Co., pretending to be an administrator from Brown Co. Jack tells Jane that there has been a problem with some accounts and asks her to verify her password with him ''just to double check our records.'' Jane does not suspect anything amiss, and parts with her password. Jack can now access Brown Co.'s computers with a valid user name and password, to steal the cookie recipe. What kind of attack is being illustrated here? 

A. Reverse Psychology 

B. Reverse Engineering 

C. Social Engineering 

D. Spoofing Identity 

E. Faking Identity 

Answer: C 


Q250. The fundamental difference between symmetric and asymmetric key cryptographic systems is that symmetric key cryptography uses which of the following? 

A. Multiple keys for non-repudiation of bulk data 

B. Different keys on both ends of the transport medium 

C. Bulk encryption for data transmission over fiber 

D. The same key on each end of the transmission medium 

Answer: D