Exam Details

  • Exam Code
    :312-50V7
  • Exam Name
    :Ethical Hacking and Countermeasures (CEHv7)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :514 Q&As
  • Last Updated
    :Jun 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V7 Questions & Answers

  • Question 321:

    Which of the following encryption is NOT based on block cipher?

    A. DES

    B. Blowfish

    C. AES (Rijndael)

    D. RC4

  • Question 322:

    Michael is a junior security analyst working for the National Security Agency (NSA) working primarily on breaking terrorist encrypted messages. The NSA has a number of methods they use to decipher encrypted messages including Government Access to Keys (GAK) and inside informants. The NSA holds secret backdoor keys to many of the encryption algorithms used on the Internet. The problem for the NSA, and Michael, is that terrorist organizations are starting to use custom-built algorithms or obscure algorithms purchased from corrupt governments. For this reason, Michael and other security analysts like him have been forced to find different methods of deciphering terrorist messages. One method that Michael thought of using was to hide malicious code inside seemingly harmless programs. Michael first monitors sites and bulletin boards used by known terrorists, and then he is able to glean email addresses to some of these suspected terrorists. Michael then inserts a stealth keylogger into a mapping program file readme.txt and then sends that as an attachment to the terrorist. This keylogger takes screenshots every 2 minutes and also logs all keyboard activity into a hidden file on the terrorist's computer. Then, the keylogger emails those files to Michael twice a day with a built in SMTP server. What technique has Michael used to disguise this keylogging software?

    A. Steganography

    B. Wrapping

    C. ADS

    D. Hidden Channels

  • Question 323:

    Buffer X in an Accounting application module for Brownies Inc. can contain 200 characters. The programmer makes an assumption that 200 characters are more than enough. Because there were no proper boundary checks being conducted, Bob decided to insert 400 characters into the 200-character buffer. (Overflows the buffer). Below is the code snippet: How can you protect/fix the problem of your application as shown above?

    A. Because the counter starts with 0, we would stop when the counter is less than 200

    B. Because the counter starts with 0, we would stop when the counter is more than 200

    C. Add a separate statement to signify that if we have written less than 200 characters to the buffer, the stack should stop because it cannot hold any more data

    D. Add a separate statement to signify that if we have written 200 characters to the buffer, the stack should stop because it cannot hold any more data

  • Question 324:

    This is an attack that takes advantage of a web site vulnerability in which the site displays content that includes un-sanitized user-provided data. See foobar What is this attack?

    A. Cross-site-scripting attack

    B. SQL Injection

    C. URL Traversal attack

    D. Buffer Overflow attack

  • Question 325:

    You are trying to break into a highly classified top-secret mainframe computer with highest security system in place at Merclyn Barley Bank located in Los Angeles. You know that conventional hacking doesn't work in this case, because organizations such as banks are generally tight and secure when it comes to protecting their systems. In other words you are trying to penetrate an otherwise impenetrable system. How would you proceed?

    A. Look for "zero-day" exploits at various underground hacker websites in Russia and China and buy the necessary exploits from these hackers and target the bank's network

    B. Try to hang around the local pubs or restaurants near the bank, get talking to a poorly-paid or disgruntled employee, and offer them money if they'll abuse their access privileges by providing you with sensitive information

    C. Launch DDOS attacks against Merclyn Barley Bank's routers and firewall systems using 100,000 or more "zombies" and "bots"

    D. Try to conduct Man-in-the-Middle (MiTM) attack and divert the network traffic going to the Merclyn Barley Bank's Webserver to that of your machine using DNS Cache Poisoning techniques

  • Question 326:

    How does a denial-of-service attack work?

    A. A hacker prevents a legitimate user (or group of users) from accessing a service

    B. A hacker uses every character, word, or letter he or she can think of to defeat authentication

    C. A hacker tries to decipher a password by using a system, which subsequently crashes the network

    D. A hacker attempts to imitate a legitimate user by confusing a computer or even another person

  • Question 327:

    You went to great lengths to install all the necessary technologies to prevent hacking attacks, such as expensive firewalls, antivirus software, anti-spam systems and intrusion detection/prevention tools in your company's network. You have configured the most secure policies and tightened every device on your network. You are confident that hackers will never be able to gain access to your network with complex security system in place. Your peer, Peter Smith who works at the same department disagrees with you. He says even the best network security technologies cannot prevent hackers gaining access to the network because of presence of "weakest link" in the security chain. What is Peter Smith talking about?

    A. Untrained staff or ignorant computer users who inadvertently become the weakest link in your security chain

    B. "zero-day" exploits are the weakest link in the security chain since the IDS will not be able to detect these attacks

    C. "Polymorphic viruses" are the weakest link in the security chain since the Anti-Virus scanners will not be able to detect these attacks

    D. Continuous Spam e-mails cannot be blocked by your security system since spammers use different techniques to bypass the filters in your gateway

  • Question 328:

    Which type of sniffing technique is generally referred as MiTM attack?

    A. Password Sniffing

    B. ARP Poisoning

    C. Mac Flooding

    D. DHCP Sniffing

  • Question 329:

    Switches maintain a CAM Table that maps individual MAC addresses on the network to physical ports on the switch.

    In MAC flooding attack, a switch is fed with many Ethernet frames, each containing different source MAC addresses, by the attacker. Switches have a limited memory for mapping various MAC addresses to physical ports. What happens when the CAM table becomes full?

    A. Switch then acts as hub by broadcasting packets to all machines on the network

    B. The CAM overflow table will cause the switch to crash causing Denial of Service

    C. The switch replaces outgoing frame switch factory default MAC address of FF:FF:FF:FF:FF:FF

    D. Every packet is dropped and the switch sends out SNMP alerts to the IDS port

  • Question 330:

    Take a look at the following attack on a Web Server using obstructed URL:

    How would you protect from these attacks?

    A. Configure the Web Server to deny requests involving "hex encoded" characters

    B. Create rules in IDS to alert on strange Unicode requests

    C. Use SSL authentication on Web Servers

    D. Enable Active Scripts Detection at the firewall and routers

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V7 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.