EC-Council 312-50 Exam Questions
Ethical Hacker Certified (Page 16 )

Updated On: 10-Mar-2026

________is an automated vulnerability assessment tool?

  1. Whack a Mole
  2. Nmap
  3. Nessus
  4. Kismet
  5. Jill32

Answer(s): C

Explanation:

Nessus is a vulnerability assessment tool.



What is the disadvantage of an automated vulnerability assessment tool?

  1. Ineffective
  2. Slow
  3. Prone to false positives
  4. Prone to false negatives
  5. Noisy

Answer(s): E

Explanation:

Vulnerability assessment tools perform a good analysis of system vulnerabilities; however, they are noisy and will quickly trip IDS systems.



What are two things that are possible when scanning UDP ports? (Choose two.

  1. A reset will be returned
  2. An ICMP message will be returned
  3. The four-way handshake will not be completed
  4. An RFC 1294 message will be returned
  5. Nothing

Answer(s): B,E

Explanation:

Closed UDP ports can return an ICMP type 3 code 3 message. No response can mean the port is open or the packet was silently dropped.



What does a type 3 code 13 represent? (Choose two).

  1. Echo request
  2. Destination unreachable
  3. Network unreachable
  4. Administratively prohibited
  5. Port unreachable
  6. Time exceeded

Answer(s): B,D

Explanation:

Type 3 code 13 is destination unreachable administratively prohibited. This type of message is typically returned from a device blocking a port.



Destination unreachable administratively prohibited messages can inform the hacker to what?

  1. That a circuit level proxy has been installed and is filtering traffic
  2. That his/her scans are being blocked by a honeypot or jail
  3. That the packets are being malformed by the scanning software
  4. That a router or other packet-filtering device is blocking traffic
  5. That the network is functioning normally

Answer(s): D

Explanation:

Destination unreachable administratively prohibited messages are a good way to discover that a router or other low-level packet device is filtering traffic. Analysis of the ICMP message will reveal the IP address of the blocking device and the filtered port. This further adds the to the network map and information being discovered about the network and hosts.



Viewing page 16 of 154
Viewing questions 76 - 80 out of 765 questions



Post your Comments and Discuss EC-Council 312-50 exam dumps with other Community members:

312-50 Exam Discussions & Posts

AI Tutor