Easily Pass By Training Lead2pass Latest Dumps https://www.freebraindump.com/free-download-pass4sure-ec-council-312-50v8-dumps.html Export date: Tue Mar 4 7:41:18 2025 / +0000 GMT |
Free Download Pass4sure EC-Council 312-50v8 DumpsCertified Ethical Hacker v8: 312-50v8 Exam 312-50v8 Questions & Answers Exam Code: 312-50v8 Exam Name: Certified Ethical Hacker v8 Q & A: 880 Q&As QUESTION 1 David is a security administrator working in Boston. David has been asked by the office's manager to block all POP3 traffic at the firewall because he believes employees are spending too much time reading personal email. How can David block POP3 at the firewall? A. David can block port 125 at the firewall. B. David can block all EHLO requests that originate from inside the office. C. David can stop POP3 traffic by blocking all HELO requests that originate from inside the office. D. David can block port 110 to block all POP3 traffic. Answer: D QUESTION 2 You want to capture Facebook website traffic in Wireshark. What display filter should you use that shows all TCP packets that contain the word 'facebook'? A. display==facebook B. traffic.content==facebook C. tcp contains facebook D. list.display.facebook Answer: C QUESTION 3 How would you describe an attack where an attacker attempts to deliver the payload over multiple packets over long periods of time with the purpose of defeating simple pattern matching in IDS systems without session reconstruction? A characteristic of this attack would be a continuous stream of small packets. A. Session Hijacking B. Session Stealing C. Session Splicing D. Session Fragmentation Answer: C QUESTION 4 Jake works as a system administrator at Acme Corp. Jason, an accountant of the firm befriends him at the canteen and tags along with him on the pretext of appraising him about potential tax benefits. Jason waits for Jake to swipe his access card and follows him through the open door into the secure systems area. How would you describe Jason's behavior within a security context? A. Smooth Talking B. Swipe Gating C. Tailgating D. Trailing Answer: C QUESTION 6 What type of Trojan is this? A. RAT Trojan B. E-Mail Trojan C. Defacement Trojan D. Destructing Trojan E. Denial of Service Trojan Answer: C QUESTION 7 Maintaining a secure Web server requires constant effort, resources, and vigilance from an organization. Securely administering a Web server on a daily basis is an essential aspect of Web server security. Maintaining the security of a Web server will usually involve the following steps:1. Configuring, protecting, and analyzing log files 2. Backing up critical information frequently 3. Maintaining a protected authoritative copy of the organization's Web content 4. Establishing and following procedures for recovering from compromise 5. Testing and applying patches in a timely manner 6. Testing security periodically. In which step would you engage a forensic investigator? A. 1 B. 2 C. 3 D. 4 E. 5 F. 6 Answer: D QUESTION 8 In Buffer Overflow exploit, which of the following registers gets overwritten with return address of the exploit code? A. EEP B. ESP C. EAP D. EIP Answer: D QUESTION 9 An attacker has successfully compromised a remote computer. Which of the following comes as one of the last steps that should be taken to ensure that the compromise cannot be traced back to the source of the problem? A. Install patches B. Setup a backdoor C. Install a zombie for DDOS D. Cover your tracks Answer: D QUESTION 10 What is War Dialing? A. War dialing involves the use of a program in conjunction with a modem to penetrate the modem/PBX-based systems B. War dialing is a vulnerability scanning technique that penetrates Firewalls C. It is a social engineering technique that uses Phone calls to trick victims D. Involves IDS Scanning Fragments to bypass Internet filters and stateful Firewalls Answer: A QUESTION 11 Steven the hacker realizes the network administrator of Acme Corporation is using syskey in Windows 2008 Server to protect his resources in the organization. Syskey independently encrypts the hashes so that physical access to the server, tapes, or ERDs is only first step to cracking the passwords. Steven must break through the encryption used by syskey before he can attempt to use brute force dictionary attacks on the hashes. Steven runs a program called "SysCracker" targeting the Windows 2008 Server machine in attempting to crack the hash used by Syskey. He needs to configure the encryption level before he can launch the attack. How many bits does Syskey use for encryption? A. 40-bit encryption B. 128-bit encryption C. 256-bit encryption D. 64-bit encryption Answer: B QUESTION 12 Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and uses the special card in order to access the restricted area of the target company. Just as the employee opens the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so that he can enter. What is the best way to undermine the social engineering activity of tailgating? A. Issue special cards to access secure doors at the company and provide a one-time only brief description of use of the special card B. Educate and enforce physical security policies of the company to all the employees on a regular basis C. Setup a mock video camera next to the special card reader adjacent to the secure door D. Post a sign that states, "no tailgating" next to the special card reader adjacent to the secure door Answer: B QUESTION 13 Ursula is a college student at a University in Amsterdam. Ursula originally went to college to study engineering but later changed to marine biology after spending a month at sea with her friends. These friends frequently go out to sea to follow and harass fishing fleets that illegally fish in foreign waters. Ursula eventually wants to put companies practicing illegal fishing out of business. Ursula decides to hack into the parent company's computers and destroy critical data knowing fully well that, if caught, she probably would be sent to jail for a very long time. What would Ursula be considered? A. Ursula would be considered a gray hat since she is performing an act against illegal activities. B. She would be considered a suicide hacker. C. She would be called a cracker. D. Ursula would be considered a black hat. Answer: B The 312-50v8 Exam Q&As are come from http://www.lead2pass.com/312-50v8.html 1. |
Links:
|
Post date: 2013-07-15 07:16:49 Post date GMT: 2013-07-15 07:16:49 Post modified date: 2013-09-03 06:37:33 Post modified date GMT: 2013-09-03 06:37:33 |
Export date: Tue Mar 4 7:41:18 2025 / +0000 GMT This page was exported from Easily Pass By Training Lead2pass Latest Dumps [ https://www.freebraindump.com ] Export of Post and Page has been powered by [ Universal Post Manager ] plugin from www.ProfProjects.com |