EC-Council 312-50 Exam Questions
Ethical Hacker Certified (Page 15 )

Updated On: 10-Mar-2026

What is the proper response for a X-MAS scan if the port is closed?

  1. SYN
  2. ACK
  3. FIN
  4. PSH
  5. RST
  6. No response

Answer(s): E

Explanation:

Closed ports respond to a X-MAS scan with a RST.



What is the proper response for a X-MAS scan if the port is open?

  1. SYN
  2. ACK
  3. FIN
  4. PSH
  5. RST
  6. No response

Answer(s): F

Explanation:

Closed ports respond to a X-MAS scan by ignoring the packet.



What flags are set in a X-MAS scan?(Choose all that apply.

  1. SYN
  2. ACK
  3. FIN
  4. PSH
  5. RST
  6. URG

Answer(s): C,D,F

Explanation:

FIN, URG, and PSH are set high in the TCP packet for a X-MAS scan



Which of the following is an automated vulnerability assessment tool?

  1. Whack a Mole
  2. Nmap
  3. Nessus
  4. Kismet
  5. Jill32

Answer(s): C

Explanation:

Nessus is a vulnerability assessment tool.



John is using a special tool on his Linux platform that has a signature database and is therefore able to detect hundred of vulnerabilities in UNIX, Windows, and commonly-used web CGI scripts. Additionally, the database detects DDoS zombies and Trojans. What would be the name of this multifunctional tool?

  1. nmap
  2. hping
  3. nessus
  4. make

Answer(s): C

Explanation:

Nessus is the world's most popular vulnerability scanner, estimated to be used by over 75, 000 organizations world-wide. Nmap is mostly used for scanning, not for detecting vulnerabilities. Hping is a free packet generator and analyzer for the TCP/IP protocol and make is used to automatically build large applications on the *nix plattform.



Viewing page 15 of 154
Viewing questions 71 - 75 out of 765 questions



Post your Comments and Discuss EC-Council 312-50 exam dumps with other Community members:

312-50 Exam Discussions & Posts

AI Tutor