EC-Council 312-50 Exam Questions
Ethical Hacker Certified (Page 23 )

Updated On: 10-Mar-2026

Your are trying the scan a machine located at ABC company’s LAN named mail.abc.com. Actually that machine located behind the firewall. Which port is used by nmap to send the TCP synchronize frame to on mail.abc.com?

  1. 443
  2. 80
  3. 8080
  4. 23

Answer(s): A



Jenny a well known hacker scanning to remote host of 204.4.4.4 using nmap. She got the scanned output but she saw that 25 port states is filtered. What is the meaning of filtered port State?

  1. Can Accessible
  2. Filtered by firewall
  3. Closed
  4. None of above

Answer(s): B

Explanation:

The state is either open, filtered, closed, or unfiltered. Filtered means that a firewall, filter, or other network obstacle is blocking the port so that Nmap cannot tell whether it is open or closed.



You want to scan the live machine on the LAN, what type of scan you should use?

  1. Connect
  2. SYN
  3. TCP
  4. UDP
  5. PING

Answer(s): E

Explanation:

The ping scan is one of the quickest scans that nmap performs, since no actual ports are queried. Unlike a port scan where thousands of packets are transferred between two stations, a ping scan requires only two frames. This scan is useful for locating active devices or determining if ICMP is passing through a firewall.



Which FTP transfer mode is required for FTP bounce attack?

  1. Active Mode
  2. Passive Mode
  3. User Mode
  4. Anonymous Mode

Answer(s): B

Explanation:

FTP bounce attack needs the server the support passive connections and the client program needs to use PORT command instead of the PASV command.



Nathalie would like to perform a reliable scan against a remote target. She is not concerned about being stealth at this point. Which of the following type of scans would be the most accurate and reliable?

  1. A FIN Scan
  2. A Half Scan
  3. A UDP Scan
  4. The TCP Connect Scan

Answer(s): D

Explanation:

The connect() system call provided by your operating system is used to open a connection to every interesting port on the machine. If the port is listening, connect() will succeed, otherwise the port isn't reachable. One strong advantage to this technique is that you don't need any special privileges. This is the fastest scanning method supported by nmap, and is available with the -t (TCP) option. The big downside is that this sort of scan is easily detectable and filterable.



Viewing page 23 of 154
Viewing questions 111 - 115 out of 765 questions



Post your Comments and Discuss EC-Council 312-50 exam dumps with other Community members:

312-50 Exam Discussions & Posts

AI Tutor