Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ECCouncil Certified Ethical Hacker 312-50 Questions and answers with ValidTests

Exam 312-50 All Questions
Exam 312-50 Premium Access

View all detail and faqs for the 312-50 exam

Viewing page 7 out of 13 pages
Viewing questions 61-70 out of questions
Questions # 61:

Perspective clients want to see sample reports from previous penetration tests.

What should you do next?

Options:

A.

Decline but, provide references.

B.

Share full reports, not redacted.

C.

Share full reports with redactions.

D.

Share reports, after NDA is signed.

Expert Solution
Questions # 62:

What is the way to decide how a packet will move from an untrusted outside host to a protected inside that is behind a firewall, which permits the hacker to determine which ports are open and if the packets can pass through the packet-filtering of the firewall?

Options:

A.

Firewalking

B.

Session hijacking

C.

Network sniffing

D.

Man-in-the-middle attack

Expert Solution
Questions # 63:

You've just been hired to perform a pen test on an organization that has been subjected to a large-scale attack. The CIO is concerned with mitigating threats and vulnerabilities to totally eliminate risk.

What is one of the first things you should do when given the job?

Options:

A.

Explain to the CIO that you cannot eliminate all risk, but you will be able to reduce risk to acceptable levels.

B.

Interview all employees in the company to rule out possible insider threats.

C.

Establish attribution to suspected attackers.

D.

Start the wireshark application to start sniffing network traffic.

Expert Solution
Questions # 64:

What attack is used to crack passwords by using a precomputed table of hashed passwords?

Options:

A.

Brute Force Attack

B.

Hybrid Attack

C.

Rainbow Table Attack

D.

Dictionary Attack

Expert Solution
Questions # 65:

Suppose you’ve gained access to your client’s hybrid network. On which port should you listen to in order to know which Microsoft Windows workstations has its file sharing enabled?

Options:

A.

1433

B.

161

C.

445

D.

3389

Expert Solution
Questions # 66:

Which of the following command line switch would you use for OS detection in Nmap?

Options:

A.

-D

B.

-O

C.

-P

D.

–X

Expert Solution
Questions # 67:

This TCP flag instructs the sending system to transmit all buffered data immediately.

Options:

A.

SYN

B.

RST

C.

PSH

D.

URG

E.

FIN

Expert Solution
Questions # 68:

It has been reported to you that someone has caused an information spillage on their computer. You go to the computer, disconnect it from the network, remove the keyboard and mouse, and power it down. What step in incident handling did you just complete?

Options:

A.

Containment

B.

Eradication

C.

Recovery

D.

Discovery

Expert Solution
Questions # 69:

What did the following commands determine?

Question # 69

Options:

A.

That the Joe account has a SID of 500

B.

These commands demonstrate that the guest account has NOT been disabled

C.

These commands demonstrate that the guest account has been disabled

D.

That the true administrator is Joe

E.

Issued alone, these commands prove nothing

Expert Solution
Questions # 70:

Which of the following Nmap commands will produce the following output?

Output:

Question # 70

Options:

A.

nmap -sN -Ps -T4 192.168.1.1

B.

nmap -sT -sX -Pn -p 1-65535 192.168.1.1

C.

nmap -sS -Pn 192.168.1.1

D.

nmap -sS -sU -Pn -p 1-65535 192.168.1.1

Expert Solution
Viewing page 7 out of 13 pages
Viewing questions 61-70 out of questions