EC-Council 312-50 Exam Questions
Ethical Hacker Certified (Page 28 )

Updated On: 10-Mar-2026

Bob is acknowledged as a hacker of repute and is popular among visitors of “underground” sites. Bob is willing to share his knowledge with those who are willing to learn, and many have expressed their interest in learning from him. However, this knowledge has a risk associated with it, as it can be used for malevolent attacks as well. In this context, what would be the most affective method to bridge the knowledge gap between the “black” hats or crackers and the “white” hats or computer security professionals? (Choose the test answer)

  1. Educate everyone with books, articles and training on risk analysis, vulnerabilities and safeguards.
  2. Hire more computer security monitoring personnel to monitor computer systems and networks.
  3. Make obtaining either a computer security certification or accreditation easier to achieve so more individuals feel that they are a part of something larger than life.
  4. Train more National Guard and reservist in the art of computer security to help out in times of emergency or crises.

Answer(s): A

Explanation:

Bridging the gap would consist of educating the white hats and the black hats equally so that their knowledge is relatively the same. Using books, articles, the internet, and professional training seminars is a way of completing this goal.



Peter extracts the SIDs list from Windows 2000 Server machine using the hacking tool “SIDExtractor”. Here is the output of the SIDs:

s-1-5-21-1125394485-807628933-54978560-100Johns
s-1-5-21-1125394485-807628933-54978560-652Rebecca
s-1-5-21-1125394485-807628933-54978560-412Sheela
s-1-5-21-1125394485-807628933-54978560-999Shawn
s-1-5-21-1125394485-807628933-54978560-777Somia
s-1-5-21-1125394485-807628933-54978560-500chang
s-1-5-21-1125394485-807628933-54978560-555Micah

From the above list identify the user account with System Administrator privileges.

  1. John
  2. Rebecca
  3. Sheela
  4. Shawn
  5. Somia
  6. Chang
  7. Micah

Answer(s): F

Explanation:

The SID of the built-in administrator will always follow this example: S-1-5-domain- 500



Which address translation scheme would allow a single public IP address to always correspond to a single machine on an internal network, allowing "server publishing"?

  1. Overloading Port Address Translation
  2. Dynamic Port Address Translation
  3. Dynamic Network Address Translation
  4. Static Network Address Translation

Answer(s): D

Explanation:

Mapping an unregistered IP address to a registered IP address on a one-to-one basis. Particularly useful when a device needs to be accessible from outside the network.



What is the following command used for? net use \targetipc$ "" /u:""

  1. Grabbing the etc/passwd file
  2. Grabbing the SAM
  3. Connecting to a Linux computer through Samba.
  4. This command is used to connect as a null session
  5. Enumeration of Cisco routers

Answer(s): D

Explanation:

The null session is one of the most debilitating vulnerabilities faced by Windows. Null sessions can be established through port 135, 139, and 445.



What is the proper response for a NULL scan if the port is closed?

  1. SYN
  2. ACK
  3. FIN
  4. PSH
  5. RST
  6. No response

Answer(s): E

Explanation:

Closed ports respond to a NULL scan with a reset.



Viewing page 28 of 154
Viewing questions 136 - 140 out of 765 questions



Post your Comments and Discuss EC-Council 312-50 exam dumps with other Community members:

312-50 Exam Discussions & Posts

AI Tutor