EC-Council 312-50 Exam Questions
Ethical Hacker Certified (Page 11 )

Updated On: 17-Feb-2026

You are scanning into the target network for the first time. You find very few conventional ports open. When you attempt to perform traditional service identification by connecting to the open ports, it yields either unreliable or no results. You are unsure of which protocols are being used. You need to discover as many different protocols as possible.
Which kind of scan would you use to achieve this? (Choose the best answer)

  1. Nessus scan with TCP based pings.
  2. Nmap scan with the –sP (Ping scan) switch.
  3. Netcat scan with the –u –e switches.
  4. Nmap with the –sO (Raw IP packets) switch.

Answer(s): D

Explanation:

Running Nmap with the –sO switch will do a IP Protocol Scan. The IP protocol scan is a bit different than the other nmap scans. The IP protocol scan is searching for additional IP protocols in use by the remote station, such as ICMP, TCP, and UDP. If a router is scanned, additional IP protocols such as EGP or IGP may be identified.



What are twp types of ICMP code used when using the ping command?

  1. It uses types 0 and 8.
  2. It uses types 13 and 14.
  3. It uses types 15 and 17.
  4. The ping command does not use ICMP but uses UDP.

Answer(s): A

Explanation:

ICMP Type 0 = Echo Reply, ICMP Type 8 = Echo



You are having problems while retrieving results after performing port scanning during internal testing. You verify that there are no security devices between you and the target system. When both stealth and connect scanning do not work, you decide to perform a NULL scan with NMAP. The first few systems scanned shows all ports open.
Which one of the following statements is probably true?

  1. The systems have all ports open.
  2. The systems are running a host based IDS.
  3. The systems are web servers.
  4. The systems are running Windows.

Answer(s): D

Explanation:

The null scan turns off all flags, creating a lack of TCP flags that should never occur in the real world. If the port is closed, a RST frame should be returned and a null scan to an open port results in no response. Unfortunately, Microsoft (like usual) decided to completely ignore the standard and do things their own way. Thus, this scan type will not work against systems running Windows as they choose not to response at all. This is a good way to distinguish that the system being scanned is running Microsoft Windows.



John has scanned the web server with NMAP. However, he could not gather enough information to help him identify the operating system running on the remote host accurately.
What would you suggest to John to help identify the OS that is being used on the remote web server?

  1. Connect to the web server with a browser and look at the web page.
  2. Connect to the web server with an FTP client.
  3. Telnet to port 8080 on the web server and look at the default page code.
  4. Telnet to an open port and grab the banner.

Answer(s): D

Explanation:

Most people don’t care about changing the banners presented by applications listening to open ports and therefore you should get fairly accurate information when grabbing banners from open ports with, for example, a telnet application.



An Nmap scan shows the following open ports, and nmap also reports that the OS guessing results to match too many signatures hence it cannot reliably be identified:

21 ftp
23 telnet
80 http
443 https

What does this suggest ?

  1. This is a Windows Domain Controller
  2. The host is not firewalled
  3. The host is not a Linux or Solaris system
  4. The host is not properly patched

Answer(s): D

Explanation:

If the answer was A nmap would guess it, it holds the MS signature database, the host not being firewalled makes no difference. The host is not linux or solaris, well it very well could be. The host is not properly patched? That is the closest; nmaps OS detection architecture is based solely off the TCP ISN issued by the operating systems TCP/IP stack, if the stack is modified to show output from randomized ISN's or if your using a program to change the ISN then OS detection will fail. If the TCP/IP IP ID's are modified then os detection could also fail, because the machine would most likely come back as being down.






Post your Comments and Discuss EC-Council 312-50 exam dumps with other Community members:

Join the 312-50 Discussion