Free 312-50 Exam Braindumps (page: 8)

Page 7 of 191

According to the CEH methodology, what is the next step to be performed after footprinting?

  1. Enumeration
  2. Scanning
  3. System Hacking
  4. Social Engineering
  5. Expanding Influence

Answer(s): B

Explanation:

Once footprinting has been completed, scanning should be attempted next. Scanning should take place on two distinct levels: network and host.



NSLookup is a good tool to use to gain additional information about a target network. What does the following command accomplish?
nslookup
> server <ipaddress>
> set type =any
> ls -d <target.com>

  1. Enables DNS spoofing
  2. Loads bogus entries into the DNS table
  3. Verifies zone security
  4. Performs a zone transfer
  5. Resets the DNS cache

Answer(s): D

Explanation:

If DNS has not been properly secured, the command sequence displayed above will perform a zone transfer.



While footprinting a network, what port/service should you look for to attempt a zone transfer?

  1. 53 UDP
  2. 53 TCP
  3. 25 UDP
  4. 25 TCP
  5. 161 UDP
  6. 22 TCP
  7. 60 TCP

Answer(s): B

Explanation:

IF TCP port 53 is detected, the opportunity to attempt a zone transfer is there.



Your lab partner is trying to find out more information about a competitors web site. The site has a .com extension. She has decided to use some online whois tools and look in one of the regional Internet registrys. Which one would you suggest she looks in first?

  1. LACNIC
  2. ARIN
  3. APNIC
  4. RIPE
  5. AfriNIC

Answer(s): B

Explanation:

Regional registries maintain records from the areas from which they govern. ARIN is responsible for domains served within North and South America and therefore, would be a good starting point for a .com domain.






Post your Comments and Discuss EC-Council 312-50 exam with other Community members:

312-50 Discussions & Posts