Free 312-50 Exam Braindumps

Which of the following activities would not be considered passive footprinting?

  1. Search on financial site such as Yahoo Financial
  2. Perform multiple queries through a search engine
  3. Scan the range of IP address found in their DNS database
  4. Go through the rubbish to find out any information that might have been discarded

Answer(s): C

Explanation:

Passive footprinting is a method in which the attacker never makes contact with the target. Scanning the targets IP addresses can be logged at the target and therefore contact has been made.



You are footprinting the www.xsecurity.com domain using the Google Search Engine. You would like to determine what sites link to www.xsecurity .com at the first level of revelance. Which of the following operator in Google search will you use to achieve this?

  1. Link: www.xsecurity.com
  2. serch?l:www.xsecurity.com
  3. level1.www.security.com
  4. pagerank:www.xsecurity.com

Answer(s): A

Explanation:

The query [link:] will list webpages that have links to the specified webpage. For instance, [link:www.google.com] will list webpages that have links pointing to the Google homepage. Note there can be no space between the "link:" and the web page url.



Doug is conducting a port scan of a target network. He knows that his client target network has a web server and that there is a mail server also which is up and running. Doug has been sweeping the network but has not been able to elicit any response from the remote target. Which of the following could be the most likely cause behind this lack of response? Select 4.

  1. UDP is filtered by a gateway
  2. The packet TTL value is too low and cannot reach the target
  3. The host might be down
  4. The destination network might be down
  5. The TCP windows size does not match
  6. ICMP is filtered by a gateway

Answer(s): A,B,C,F

Explanation:

If the destination host or the destination network is down there is no way to get an answer and if TTL (Time To Live) is set too low the UDP packets will “die” before reaching the host because of too many hops between the scanning computer and the target. The TCP receive window size is the amount of received data (in bytes) that can be buffered during a connection. The sending host can send only that amount of data before it must wait for an acknowledgment and window update from the receiving host and ICMP is mainly used for echo requests and not in port scans.



Exhibit:

Joe Hacker runs the hping2 hacking tool to predict the target host’s sequence numbers in one of the hacking session.
What does the first and second column mean? Select two.

  1. The first column reports the sequence number
  2. The second column reports the difference between the current and last sequence number
  3. The second column reports the next sequence number
  4. The first column reports the difference between current and last sequence number

Answer(s): A,B






Post your Comments and Discuss EC-Council 312-50 exam with other Community members:

Comeru commented on October 15, 2024
You pass this exam with these questions. But you need to get the full version.
UNITED STATES
upvote

ribrahim commented on June 29, 2023
Done the purchase downloaded successfully thanks!
SINGAPORE
upvote

Drew commented on March 08, 2018
need step 3 download activated
UNITED STATES
upvote

Josh commented on September 18, 2017
Just paid for it ... seamless experience ... looking forward to using the program to study for the CEH and pass it with flying colors!
UNITED STATES
upvote