web analytics
[2017 Newest] Free Download Of Lead2pass 312-50v9 Real Exam Questions (281-300) | Updated Study Materials From Lead2pass Free Downloading

[2017 Newest] Free Download Of Lead2pass 312-50v9 Real Exam Questions (281-300)

Lead2pass 2017 September New EC-Council 312-50v9 Exam Dumps!

100% Free Download! 100% Pass Guaranteed!

How to 100% pass 312-50v9 exam? Lead2pass 312-50v9 dump is unparalleled in quality and is 100% guaranteed to make you pass 312-50v9 exam. All the 312-50v9 exam questions are the latest. Here are some free share of EC-Council 312-50v9 dumps.

Following questions and answers are all new published by EC-Council Official Exam Center: https://www.lead2pass.com/312-50v9.html

In order to have an anonymous Internet surf, which of the following is best choice?

A.    Use SSL sites when entering personal information
B.    Use Tor network with multi-node
C.    Use shared WiFi
D.    Use public VPN

Answer: B

A penetration test was done at a company. After the test, a report was written and given to the company’s IT authorities. A section from the report is shown below:

– Access List should be written between VLANs.
– Port security should be enabled for the intranet.
– A security solution which filters data packets should be set between intranet (LAN) and DMZ.
– A WAF should be used in front of the web applications.

According to the section from the report, which of the following choice is true?

A.    MAC Spoof attacks cannot be performed.
B.    Possibility of SQL Injection attack is eliminated.
C.    A stateful firewall can be used between intranet (LAN) and DMZ.
D.    There is access control policy between VLANs.

Answer: C

Websites and web portals that provide web services commonly use the Simple Object Access Protocol SOAP.
Which of the following is an incorrect definition or characteristics in the protocol?

A.    Based on XML
B.    Provides a structured model for messaging
C.    Exchanges data between web services
D.    Only compatible with the application protocol HTTP

Answer: D

An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?

A.    He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.
B.    He will activate OSPF on the spoofed root bridge.
C.    He will repeat the same attack against all L2 switches of the network.
D.    He will repeat this action so that it escalates to a DoS attack.

Answer: A

A large mobile telephony and data network operator has a data that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems. What is the best security policy concerning this setup?

A.    Network elements must be hardened with user ids and strong passwords. Regular security tests and audits should be performed.
B.    As long as the physical access to the network elements is restricted, there is no need for additional measures.
C.    There is no need for specific security measures on the network elements as long as firewalls and IPS systems exist.
D.    The operator knows that attacks and down time are inevitable and should have a backup site.

Answer: A

When purchasing a biometric system, one of the considerations that should be reviewed is the processing speed. Which of the following best describes what it is meant by processing?

A.    The amount of time it takes to convert biometric data into a template on a smart card.
B.    The amount of time and resources that are necessary to maintain a biometric system.
C.    The amount of time it takes to be either accepted or rejected form when an individual provides Identification and authentication information.
D.    How long it takes to setup individual user accounts.

Answer: C

Due to a slow down of normal network operations, IT department decided to monitor internet traffic for all of the employees. From a legal stand point, what would be troublesome to take this kind of measure?

A.    All of the employees would stop normal work activities
B.    IT department would be telling employees who the boss is
C.    Not informing the employees that they are going to be monitored could be an invasion of privacy.
D.    The network could still experience traffic slow down.

Answer: C

In many states sending spam is illegal. Thus, the spammers have techniques to try and ensure that no one knows they sent the spam out to thousands of users at a time. Which of the following best describes what spammers use to hide the origin of these types of e-mails?

A.    A blacklist of companies that have their mail server relays configured to allow traffic only to their specific domain name.
B.    Mail relaying, which is a technique of bouncing e-mail from internal to external mails servers continuously.
C.    A blacklist of companies that have their mail server relays configured to be wide open.
D.    Tools that will reconfigure a mail server’s relay component to send the e-mail back to the spammers occasionally.

Answer: B

You are an Ethical Hacker who is auditing the ABC company. When you verify the NOC one of the machines has 2 connections, one wired and the other wireless. When you verify the configuration of this Windows system you find two static routes.

route add mask
route add mask

What is the main purpose of those static routes?

A.    Both static routes indicate that the traffic is external with different gateway.
B.    The first static route indicates that the internal traffic will use an external gateway and the second static route indicates that the traffic will be rerouted.
C.    Both static routes indicate that the traffic is internal with different gateway.
D.    The first static route indicates that the internal addresses are using the internal gateway and the second static route indicates that all the traffic that is not internal must go to an external gateway.

Answer: D

What is the correct process for the TCP three-way handshake connection establishment and connection termination?

A.    Connection Establishment: FIN, ACK-FIN, ACK
Connection Termination: SYN, SYN-ACK, ACK
B.    Connection Establishment: SYN, SYN-ACK, ACK
Connection Termination: ACK, ACK-SYN, SYN
C.    Connection Establishment: ACK, ACK-SYN, SYN
Connection Termination: FIN, ACK-FIN, ACK
D.    Connection Establishment: SYN, SYN-ACK, ACK
Connection Termination: FIN, ACK-FIN, ACK

Answer: D

Emil uses nmap to scan two hosts using this command.

nmap -sS -T4 -O

He receives this output:

Nmap scan report for
Host is up (0.00082s latency).
Not shown: 994 filtered ports
21/tcp open ftp
23/tcp open telnet
53/tcp open domain
80/tcp open http
161/tcp closed snmp
MAC Address: B0:75:D5:33:57:74 (ZTE)
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.9 – 2.6.33
Network Distance: 1 hop

Nmap scan report for
Host is up (0.000047s latency).
All 1000 scanned ports on are closed
Too many fingerprints match this host to give specific OS details Network Distance: 0 hops

What is his conclusion?

A.    Host is an iPad.
B.    He performed a SYN scan and OS scan on hosts and
C.    Host is the host that he launched the scan from.
D.    Host is down.

Answer: B

You’re doing an internal security audit and you want to find out what ports are open on all the servers. What is the best way to find out?

A.    Scan servers with Nmap
B.    Physically go to each server
C.    Scan servers with MBSA
D.    Telent to every port on each server

Answer: A

Jimmy is standing outside a secure entrance to a facility. He is pretending to have a tense conversation on his cell phone as an authorized employee badges in. Jimmy, while still on the phone, grabs the door as it begins to close.
What just happened?

A.    Phishing
B.    Whaling
C.    Tailgating
D.    Masquerading

Answer: C

Which protocol is used for setting up secured channels between two devices, typically in VPNs?

B.    PEM
C.    SET
D.    PPP

Answer: A

In cryptanalysis and computer security, ‘pass the hash’ is a hacking technique that allows an attacker to authenticate to a remote server/service by using the underlying NTLM and/or LanMan hash of a user’s password, instead of requiring the associated plaintext password as is normally the case. Metasploit Framework has a module for this technique: psexec. The psexec module is often used by penetration testers to obtain access to a given system that you already know the credentials for. It was written by sysinternals and has been integrated within the framework. Often as penetration testers, successfully gain access to a system through some exploit, use meterpreter to grab the passwords or other methods like fgdump, pwdump, or cachedump and then utilize rainbowtables to crack those hash values.
Which of the following is true hash type and sort order that is using in the psexec module’s ‘smbpass’?

A.    NT:LM
B.    LM:NT

Answer: B

Which of the following Nmap commands will produce the following output?

Starting Nmap 6.47 (http://nmap.org ) at 2015-05-26 12:50 EDT
Nmap scan report for
Host is up (0.00042s latency).
Not shown: 65530 open|filtered ports, 65529 filtered ports
111/tcp open rpcbind
999/tcp open garcon
1017/tcp open unknown
1021/tcp open exp1
1023/tcp open netvenuechat
2049/tcp open nfs
17501/tcp open unknown
111/udp open rpcbind
123/udp open ntp
137/udp open netbios-ns
2049/udp open nfs
5353/udp open zeroconf
17501/udp open|filtered unknown
51857/udp open|filtered unknown
54358/udp open|filtered unknown
56228/udp open|filtered unknown
57598/udp open|filtered unknown
59488/udp open|filtered unknown
60027/udp open|filtered unknown

A.    nmap -sN -Ps -T4
B.    nmap -sT -sX -Pn -p 1-65535
C.    nmap -sS -Pn
D.    nmap -sS -sU -Pn -p 1-65535

Answer: D

Which Metasploit Framework tool can help penetration tester for evading Anti-virus Systems?

A.    msfpayload
B.    msfcli
C.    msfencode
D.    msfd

Answer: C

You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?

A.    hping2 host.domain.com
B.    hping2 –set-ICMP host.domain.com
C.    hping2 -i host.domain.com
D.    hping2 -1 host.domain.com

Answer: D

Which of the following is a passive wireless packet analyzer that works on Linux-based systems?

A.    Burp Suite
B.    OpenVAS
C.    tshark
D.    Kismet

Answer: D

The establishment of a TCP connection involves a negotiation called 3 way handshake. What type of message sends the client to the server in order to begin this negotiation?

A.    RST
B.    ACK
D.    SYN

Answer: D

More free Lead2pass 312-50v9 exam new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDTVZJRHRvblhycms

Always up-to-date Lead2pass 312-50v9 VCE – everything you need for your EC-Council 312-50v9 exam to pass. Our EC-Council 312-50v9 software allows you to practise exam dumps in real 312-50v9 exam environment. Welcome to choose.

2017 EC-Council 312-50v9 (All 589 Q&As) exam dumps (PDF&VCE) from Lead2pass:

https://www.lead2pass.com/312-50v9.html [100% Exam Pass Guaranteed]


Comments are closed.