Free 312-50 Exam Braindumps (page: 19)

Page 19 of 191

What are two things that are possible when scanning UDP ports? (Choose two.

  1. A reset will be returned
  2. An ICMP message will be returned
  3. The four-way handshake will not be completed
  4. An RFC 1294 message will be returned
  5. Nothing

Answer(s): B,E

Explanation:

Closed UDP ports can return an ICMP type 3 code 3 message. No response can mean the port is open or the packet was silently dropped.



What does a type 3 code 13 represent? (Choose two).

  1. Echo request
  2. Destination unreachable
  3. Network unreachable
  4. Administratively prohibited
  5. Port unreachable
  6. Time exceeded

Answer(s): B,D

Explanation:

Type 3 code 13 is destination unreachable administratively prohibited. This type of message is typically returned from a device blocking a port.



Destination unreachable administratively prohibited messages can inform the hacker to what?

  1. That a circuit level proxy has been installed and is filtering traffic
  2. That his/her scans are being blocked by a honeypot or jail
  3. That the packets are being malformed by the scanning software
  4. That a router or other packet-filtering device is blocking traffic
  5. That the network is functioning normally

Answer(s): D

Explanation:

Destination unreachable administratively prohibited messages are a good way to discover that a router or other low-level packet device is filtering traffic. Analysis of the ICMP message will reveal the IP address of the blocking device and the filtered port. This further adds the to the network map and information being discovered about the network and hosts.



Which of the following Nmap commands would be used to perform a stack fingerprinting?

  1. Nmap -O -p80 <host(s.>
  2. Nmap -hU -Q<host(s.>
  3. Nmap -sT -p <host(s.>
  4. Nmap -u -o -w2 <host>
  5. Nmap -sS -0p target

Answer(s): A

Explanation:

This option activates remote host identification via TCP/IP fingerprinting. In other words, it uses a bunch of techniques to detect subtlety in the underlying operating system network stack of the computers you are scanning. It uses this information to create a "fingerprint" which it compares with its database of known OS fingerprints (the nmap-os-fingerprints file. to decide what type of system you are scanning.



Page 19 of 191



Post your Comments and Discuss EC-Council 312-50 exam with other Community members:

Comeru commented on October 15, 2024
You pass this exam with these questions. But you need to get the full version.
UNITED STATES
upvote

ribrahim commented on June 29, 2023
Done the purchase downloaded successfully thanks!
SINGAPORE
upvote

Drew commented on March 08, 2018
need step 3 download activated
UNITED STATES
upvote

Josh commented on September 18, 2017
Just paid for it ... seamless experience ... looking forward to using the program to study for the CEH and pass it with flying colors!
UNITED STATES
upvote