Free Download Pass4sure EC-Council 312-50v8 Dumps

Certified Ethical Hacker v8: 312-50v8 Exam
312-50v8 Questions & Answers
Exam Code: 312-50v8
Exam Name: Certified Ethical Hacker v8
Q & A: 880 Q&As

QUESTION 1
David is a security administrator working in Boston. David has been asked by the office’s
manager to block all POP3 traffic at the firewall because he believes employees are spending too
much time reading personal email. How can David block POP3 at the firewall?
A. David can block port 125 at the firewall.
B. David can block all EHLO requests that originate from inside the office.
C. David can stop POP3 traffic by blocking all HELO requests that originate from inside the office.
D. David can block port 110 to block all POP3 traffic.
Answer: D

QUESTION 2
You want to capture Facebook website traffic in Wireshark. What display filter should you use that
shows all TCP packets that contain the word ‘facebook’?
A. display==facebook
B. traffic.content==facebook
C. tcp contains facebook
D. list.display.facebook
Answer: C

QUESTION 3
How would you describe an attack where an attacker attempts to deliver the payload over
multiple packets over long periods of time with the purpose of defeating simple pattern matching
in IDS systems without session reconstruction? A characteristic of this attack would be a
continuous stream of small packets.
A. Session Hijacking
B. Session Stealing
C. Session Splicing
D. Session Fragmentation
Answer: C

QUESTION 4
Jake works as a system administrator at Acme Corp. Jason, an accountant of the firm befriends
him at the canteen and tags along with him on the pretext of appraising him about potential tax
benefits. Jason waits for Jake to swipe his access card and follows him through the open door
into the secure systems area. How would you describe Jason’s behavior within a security
context?
A. Smooth Talking
B. Swipe Gating
C. Tailgating
D. Trailing
Answer: C

QUESTION 6
What type of Trojan is this?
A. RAT Trojan
B. E-Mail Trojan
C. Defacement Trojan
D. Destructing Trojan
E. Denial of Service Trojan
Answer: C

QUESTION 7
Maintaining a secure Web server requires constant effort, resources, and vigilance from an
organization. Securely administering a Web server on a daily basis is an essential aspect of Web
server security. Maintaining the security of a Web server will usually involve the following steps:1. Configuring, protecting, and analyzing log files
2. Backing up critical information frequently
3. Maintaining a protected authoritative copy of the organization’s Web content
4. Establishing and following procedures for recovering from compromise
5. Testing and applying patches in a timely manner
6. Testing security periodically.
In which step would you engage a forensic investigator?
A. 1
B. 2
C. 3
D. 4
E. 5
F. 6
Answer: D

QUESTION 8
In Buffer Overflow exploit, which of the following registers gets overwritten with return address of
the exploit code?
A. EEP
B. ESP
C. EAP
D. EIP
Answer: D

QUESTION 9
An attacker has successfully compromised a remote computer. Which of the following comes as
one of the last steps that should be taken to ensure that the compromise cannot be traced back
to the source of the problem?
A. Install patches
B. Setup a backdoor
C. Install a zombie for DDOS
D. Cover your tracks
Answer: D

QUESTION 10
What is War Dialing?
A. War dialing involves the use of a program in conjunction with a modem to penetrate the modem/PBX-based
systems
B. War dialing is a vulnerability scanning technique that penetrates Firewalls
C. It is a social engineering technique that uses Phone calls to trick victims
D. Involves IDS Scanning Fragments to bypass Internet filters and stateful Firewalls
Answer: A

QUESTION 11
Steven the hacker realizes the network administrator of Acme Corporation is using syskey in
Windows 2008 Server to protect his resources in the organization. Syskey independently
encrypts the hashes so that physical access to the server, tapes, or ERDs is only first step to
cracking the passwords. Steven must break through the encryption used by syskey before he can
attempt to use brute force dictionary attacks on the hashes. Steven runs a program called
“SysCracker” targeting the Windows 2008 Server machine in attempting to crack the hash used
by Syskey. He needs to configure the encryption level before he can launch the attack. How
many bits does Syskey use for encryption?
A. 40-bit encryption
B. 128-bit encryption
C. 256-bit encryption
D. 64-bit encryption
Answer: B

QUESTION 12
Bob waits near a secured door, holding a box. He waits until an employee walks up to the
secured door and uses the special card in order to access the restricted area of the target
company. Just as the employee opens the door, Bob walks up to the employee (still holding the
box) and asks the employee to hold the door open so that he can enter. What is the best way to
undermine the social engineering activity of tailgating?
A. Issue special cards to access secure doors at the company and provide a one-time only brief description
of use of the special card
B. Educate and enforce physical security policies of the company to all the employees on a regular basis
C. Setup a mock video camera next to the special card reader adjacent to the secure door
D. Post a sign that states, “no tailgating” next to the special card reader adjacent to the secure door
Answer: B

QUESTION 13
Ursula is a college student at a University in Amsterdam. Ursula originally went to college to study
engineering but later changed to marine biology after spending a month at sea with her friends.
These friends frequently go out to sea to follow and harass fishing fleets that illegally fish in
foreign waters. Ursula eventually wants to put companies practicing illegal fishing out of business.
Ursula decides to hack into the parent company’s computers and destroy critical data knowing
fully well that, if caught, she probably would be sent to jail for a very long time. What would Ursula
be considered?
A. Ursula would be considered a gray hat since she is performing an act against illegal activities.
B. She would be considered a suicide hacker.
C. She would be called a cracker.
D. Ursula would be considered a black hat.
Answer: B

The 312-50v8 Exam Q&As are come from http://www.lead2pass.com/312-50v8.html.

         

Why Choose Lead2pass?

If you want to pass the exam successfully in first attempt you have to choose the best IT study material provider, in my opinion, Lead2pass is one of the best way to prepare for the exam.

Lead2pass Testking Pass4sure Actualtests Others
$99.99 $124.99 $125.99 $189 $29.99-$49.99
Up-to-Dated
Real Questions
Error Correction
Printable PDF
Premium VCE
VCE Simulator
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back