Exam Details

  • Exam Code
    :312-50V8
  • Exam Name
    :Certified Ethical Hacker v8
  • Certification
    :New Release
  • Vendor
    :NetApp
  • Total Questions
    :1008 Q&As
  • Last Updated
    :Apr 25, 2024

NetApp New Release 312-50V8 Questions & Answers

  • Question 1:

    Why do you need to capture five to ten million packets in order to crack WEP with AirSnort?

    A. All IVs are vulnerable to attack

    B. Air Snort uses a cache of packets

    C. Air Snort implements the FMS attack and only encrypted packets are counted

    D. A majority of weak IVs transmitted by access points and wireless cards are not filtered by contemporary wireless manufacturers

  • Question 2:

    Sally is a network admin for a small company. She was asked to install wireless accesspoints in the building. In looking at the specifications for the access-points, she sees that all of them offer WEP.

    Which of these are true about WEP? Select the best answer.

    A. Stands for Wireless Encryption Protocol

    B. It makes a WLAN as secure as a LAN

    C. Stands for Wired Equivalent Privacy

    D. It offers end to end security

  • Question 3:

    Derek has stumbled upon a wireless network and wants to assess its security. However, he does not find enough traffic for a good capture. He intends to use AirSnort on the captured traffic to crack the WEP key and does not know the IP address range or the AP.

    How can he generate traffic on the network so that he can capture enough packets to crack the WEP key?

    A. Use any ARP requests found in the capture

    B. Derek can use a session replay on the packets captured

    C. Derek can use KisMAC as it needs two USB devices to generate traffic

    D. Use Ettercap to discover the gateway and ICMP ping flood tool to generate traffic

  • Question 4:

    Matthew re-injects a captured wireless packet back onto the network. He does this hundreds of times within a second. The packet is correctly encrypted and Matthew assumes it is an ARP request packet. The wireless host responds with a stream of responses, all individually encrypted with different IVs.

    What is this attack most appropriately called?

    A. Spoof attack

    B. Replay attack

    C. Injection attack

    D. Rebound attack

  • Question 5:

    Jackson discovers that the wireless AP transmits 128 bytes of plaintext, and the station responds by encrypting the plaintext. It then transmits the resulting ciphertext using the same key and cipher that are used by WEP to encrypt subsequent network traffic.

    What authentication mechanism is being followed here?

    A. no authentication

    B. single key authentication

    C. shared key authentication

    D. open system authentication

  • Question 6:

    Jacob would like your advice on using a wireless hacking tool that can save him time and get him better results with lesser packets. You would like to recommend a tool that uses KoreK's implementation.

    Which tool would you recommend from the list below?

    A. Kismet

    B. Shmoo

    C. Aircrack

    D. John the Ripper

  • Question 7:

    In order to attack a wireless network, you put up an access point and override the signal of the real access point. As users send authentication data, you are able to capture it.

    What kind of attack is this?

    A. WEP attack

    B. Drive by hacking

    C. Rogue access point attack

    D. Unauthorized access point attack

  • Question 8:

    On wireless networks, SSID is used to identify the network.

    Why are SSID not considered to be a good security mechanism to protect a wireless networks?

    A. The SSID is only 32 bits in length.

    B. The SSID is transmitted in clear text.

    C. The SSID is the same as the MAC address for all vendors.

    D. The SSID is to identify a station,not a network.

  • Question 9:

    Bob reads an article about how insecure wireless networks can be. He gets approval from his management to implement a policy of not allowing any wireless devices on the network.

    What other steps does Bob have to take in order to successfully implement this? (Select 2 answer.)

    A. Train users in the new policy.

    B. Disable all wireless protocols at the firewall.

    C. Disable SNMP on the network so that wireless devices cannot be configured.

    D. Continuously survey the area for wireless devices.

  • Question 10:

    While probing an organization you discover that they have a wireless network. From your attempts to connect to the WLAN you determine that they have deployed MAC filtering by using ACL on the access points.

    What would be the easiest way to circumvent and communicate on the WLAN?

    A. Attempt to crack the WEP key using Airsnort.

    B. Attempt to brute force the access point and update or delete the MAC ACL.

    C. Steel a client computer and use it to access the wireless network.

    D. Sniff traffic if the WLAN and spoof your MAC address to one that you captured.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only NetApp exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V8 exam preparations and NetApp certification application, do not hesitate to visit our Vcedump.com to find your solutions here.