Month End Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

312-50 Exam Dumps - ECCouncil Certified Ethical Hacker Questions and Answers

Question # 54

Which of the following is the most important phase of ethical hacking wherein you need to spend considerable amount of time?

Options:

A.

Gaining access

B.

Escalating privileges

C.

Network mapping

D.

Footprinting

Buy Now
Question # 55

You have successfully compromised a machine on the network and found a server that is alive on the same network. You tried to ping it but you didn't get any response back.

What is happening?

Options:

A.

ICMP could be disabled on the target server.

B.

The ARP is disabled on the target server.

C.

TCP/IP doesn't support ICMP.

D.

You need to run the ping command with root privileges.

Buy Now
Question # 56

Within the context of Computer Security, which of the following statements describes Social Engineering best?

Options:

A.

Social Engineering is the act of publicly disclosing information

B.

Social Engineering is the means put in place by human resource to perform time accounting

C.

Social Engineering is the act of getting needed information from a person rather than breaking into a system

D.

Social Engineering is a training program within sociology studies

Buy Now
Question # 57

An attacker attaches a rogue router in a network. He wants to redirect traffic to a LAN attached to his router as part of a man-in-the-middle attack. What measure on behalf of the legitimate admin can mitigate this attack?

Options:

A.

Only using OSPFv3 will mitigate this risk.

B.

Make sure that legitimate network routers are configured to run routing protocols with authentication.

C.

Redirection of the traffic cannot happen unless the admin allows it explicitly.

D.

Disable all routing protocols and only use static routes.

Buy Now
Question # 58

An enterprise recently moved to a new office and the new neighborhood is a little risky. The CEO wants to monitor the physical perimeter and the entrance doors 24 hours. What is the best option to do this job?

Options:

A.

Use fences in the entrance doors.

B.

Install a CCTV with cameras pointing to the entrance doors and the street.

C.

Use an IDS in the entrance doors and install some of them near the corners.

D.

Use lights in all the entrance doors and along the company's perimeter.

Buy Now
Question # 59

Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?

Options:

A.

Scalability

B.

Speed

C.

Key distribution

D.

Security

Buy Now
Question # 60

Sandra is the security administrator of XYZ.com. One day she notices that the XYZ.com Oracle database server has been compromised and customer information along with financial data has been stolen. The financial loss will be estimated in millions of dollars if the database gets into the hands of competitors. Sandra wants to report this crime to the law enforcement agencies immediately. Which organization coordinates computer crime investigations throughout the United States?

Options:

A.

NDCA

B.

NICP

C.

CIRP

D.

NPC

E.

CIA

Buy Now
Question # 61

The following is a sample of output from a penetration tester's machine targeting a machine with the IP address of 192.168.1.106:

What is most likely taking place?

Options:

A.

Ping sweep of the 192.168.1.106 network

B.

Remote service brute force attempt

C.

Port scan of 192.168.1.106

D.

Denial of service attack on 192.168.1.106

Buy Now
Question # 62

A penetration tester is hired to do a risk assessment of a company's DMZ. The rules of engagement states that the penetration test be done from an external IP address with no prior knowledge of the internal IT systems. What kind of test is being performed?

Options:

A.

white box

B.

grey box

C.

red box

D.

black box

Buy Now
Question # 63

What is one thing a tester can do to ensure that the software is trusted and is not changing or tampering with critical data on the back end of a system it is loaded on?

Options:

A.

Proper testing

B.

Secure coding principles

C.

Systems security and architecture review

D.

Analysis of interrupts within the software

Buy Now
Exam Code: 312-50
Exam Name: Ethical Hacking and Countermeasures
Last Update: Jan 31, 2025
Questions: 765
312-50 pdf

312-50 PDF

$25.5  $84.99
312-50 Engine

312-50 Testing Engine

$28.5  $94.99
312-50 PDF + Engine

312-50 PDF + Testing Engine

$40.5  $134.99