EC-Council 312-50 Exam Questions
Ethical Hacker Certified (Page 27 )

Updated On: 10-Mar-2026

Which of the following nmap command in Linux procedures the above output?

  1. sudo nmap –sP 192.168.0.1/24
  2. root nmap –sA 192.168.0.1/24
  3. run nmap –TX 192.168.0.1/24
  4. launch nmap –PP 192.168.0.1/24

Answer(s): A

Explanation:

This is an output from a ping scan. The option –sP will give you a ping scan of the 192.168.0.1/24 network.



Sandra has been actively scanning the client network on which she is doing a vulnerability assessment test. While conducting a port scan she notices open ports in the range of 135 to 139. What protocol is most likely to be listening on those ports?

  1. Finger
  2. FTP
  3. Samba
  4. SMB

Answer(s): D

Explanation:

The SMB (Server Message Block) protocol is used among other things for file sharing in Windows NT / 2000. In Windows NT it ran on top of NBT (NetBIOS over TCP/IP), which used the famous ports 137, 138 (UDP) and 139 (TCP). In Windows 2000, Microsoft added the possibility to run SMB directly over TCP/IP, without the extra layer of NBT. For this they use TCP port 445.



SNMP is a protocol used to query hosts, servers, and devices about performance or health status datA. This protocol has long been used by hackers to gather great amount of information about remote hosts.
Which of the following features makes this possible? (Choose two)

  1. It used TCP as the underlying protocol.
  2. It uses community string that is transmitted in clear text.
  3. It is susceptible to sniffing.
  4. It is used by all network devices on the market.

Answer(s): B,C

Explanation:

Simple Network Management Protocol (SNMP) is a protocol which can be used by administrators to remotely manage a computer or network device. There are typically 2 modes of remote SNMP monitoring. These modes are roughly 'READ' and 'WRITE' (or PUBLIC and PRIVATE). If an attacker is able to guess a PUBLIC community string, they would be able to read SNMP data (depending on which MIBs are installed) from the remote device. This information might include system time, IP addresses, interfaces, processes running, etc. Version 1 of SNMP has been criticized for its poor security. Authentication of clients is performed only by a "community string", in effect a type of password, which is transmitted in cleartext.



John is a keen administrator, and has followed all of the best practices as he could find on securing his Windows Server. He has renamed the Administrator account to a new name that he is sure cannot be easily guessed. However, there are people who already attempt to compromise his newly renamed administrator account.
How is it possible for a remote attacker to decipher the name of the administrator account if it has been renamed?

  1. The attacker used the user2sid program.
  2. The attacker used the sid2user program.
  3. The attacker used nmap with the –V switch.
  4. The attacker guessed the new name.

Answer(s): B

Explanation:

User2sid.exe can retrieve a SID from the SAM (Security Accounts Manager) from the local or a remote machine Sid2user.exe can then be used to retrieve the names of all the user accounts and more. These utilities do not exploit a bug but call the functions LookupAccountName and LookupAccountSid respectively. What is more these can be called against a remote machine without providing logon credentials save those needed for a null session connection.



Jess the hacker runs L0phtCrack’s built-in sniffer utility which grabs SMB password hashes and stores them for offline cracking. Once cracked, these passwords can provide easy access to whatever network resources the user account has access to.
But Jess is not picking up hashed from the network. Why?

  1. The network protocol is configured to use SMB Signing.
  2. The physical network wire is on fibre optic cable.
  3. The network protocol is configured to use IPSE
  4. L0phtCrack SMB filtering only works through Switches and not Hubs.

Answer(s): A

Explanation:

To protect against SMB session hijacking, NT supports a cryptographic integrity mechanism, SMB Signing, to prevent active network taps from interjecting themselves into an already established session.



Viewing page 27 of 154
Viewing questions 131 - 135 out of 765 questions



Post your Comments and Discuss EC-Council 312-50 exam dumps with other Community members:

312-50 Exam Discussions & Posts

AI Tutor