Exam Details

  • Exam Code
    :312-50V8
  • Exam Name
    :Certified Ethical Hacker v8
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :1008 Q&As
  • Last Updated
    :May 27, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V8 Questions & Answers

  • Question 761:

    Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?

    A. To determine who is the holder of the root account

    B. To perform a DoS

    C. To create needless SPAM

    D. To illicit a response back that will reveal information about email servers and how they treat undeliverable mail

    E. To test for virus protection

  • Question 762:

    As a securing consultant, what are some of the things you would recommend to a company to ensure DNS security? Select the best answers.

    A. Use the same machines for DNS and other applications

    B. Harden DNS servers

    C. Use split-horizon operation for DNS servers

    D. Restrict Zone transfers

    E. Have subnet diversity between DNS servers

  • Question 763:

    Exhibit:

    The following is an entry captured by a network IDS.You are assigned the task of analyzing this entry. You

    notice the value 0x90, which is the most common NOOP instruction for the

    Intel processor. You figure that the attacker is attempting a buffer overflow attack. You also notice "/bin/sh"

    in the ASCII part of the output. As an analyst what would you conclude about the attack?

    A. The buffer overflow attack has been neutralized by the IDS

    B. The attacker is creating a directory on the compromised machine

    C. The attacker is attempting a buffer overflow attack and has succeeded

    D. The attacker is attempting an exploit that launches a command-line shell

  • Question 764:

    Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?

    A. har.txt

    B. SAM file

    C. wwwroot

    D. Repair file

  • Question 765:

    Exhibit: Study the following log extract and identify the attack.

    A. Hexcode Attack

    B. Cross Site Scripting

    C. Multiple Domain Traversal Attack

    D. Unicode Directory Traversal Attack

  • Question 766:

    Which of the following represents the initial two commands that an IRC client sends to join an IRC network?

    A. USER,NICK

    B. LOGIN,NICK

    C. USER,PASS

    D. LOGIN,USER

  • Question 767:

    Null sessions are un-authenticated connections (not using a username or password.) to an NT or 2000 system.

    Which TCP and UDP ports must you filter to check null sessions on your network?

    A. 137 and 139

    B. 137 and 443

    C. 139 and 443

    D. 139 and 445

  • Question 768:

    Eve is spending her day scanning the library computers. She notices that Alice is using a computer whose port 445 is active and listening. Eve uses the ENUM tool to enumerate Alice machine. From the command prompt, she types the following command.

    For /f "tokens=1 %%a in (hackfile.txt) do net use * \\10.1.2.3\c$ /user:"Administrator" %%a

    What is Eve trying to do?

    A. Eve is trying to connect as an user with Administrator privileges

    B. Eve is trying to enumerate all users with Administrative privileges

    C. Eve is trying to carry out a password crack for user Administrator

    D. Eve is trying to escalate privilege of the null user to that of Administrator

  • Question 769:

    Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between the two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric is relaying the information between the two.

    What would you call this attack?

    A. Interceptor

    B. Man-in-the-middle

    C. ARP Proxy

    D. Poisoning Attack

  • Question 770:

    Susan has attached to her company's network. She has managed to synchronize her boss's sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory.

    What kind of attack is Susan carrying on?

    A. A sniffing attack

    B. A spoofing attack

    C. A man in the middle attack

    D. A denial of service attack

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V8 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.