Exam Details

  • Exam Code
    :312-50V8
  • Exam Name
    :Certified Ethical Hacker v8
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :1008 Q&As
  • Last Updated
    :May 27, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V8 Questions & Answers

  • Question 781:

    What is the proper response for a NULL scan if the port is open?

    A. SYN

    B. ACK

    C. FIN

    D. PSH

    E. RST

    F. No response

  • Question 782:

    What is a NULL scan?

    A. A scan in which all flags are turned off

    B. A scan in which certain flags are off

    C. A scan in which all flags are on

    D. A scan in which the packet size is set to zero

    E. A scan with a illegal packet size

  • Question 783:

    What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall if your network is comprised of Windows NT, 2000, and XP?(Choose all that apply.

    A. 110

    B. 135

    C. 139

    D. 161

    E. 445

    F. 1024

  • Question 784:

    When an alert rule is matched in a network-based IDS like snort, the IDS does which of the following?

    A. Drops the packet and moves on to the next one

    B. Continues to evaluate the packet until all rules are checked

    C. Stops checking rules,sends an alert,and lets the packet continue

    D. Blocks the connection with the source IP address in the packet

  • Question 785:

    You are the security administrator for a large network. You want to prevent attackers from running any sort of traceroute into your DMZ and discovering the internal structure of publicly accessible areas of the network.

    How can you achieve this?

    A. There is no way to completely block tracerouting into this area

    B. Block UDP at the firewall

    C. Block TCP at the firewall

    D. Block ICMP at the firewall

  • Question 786:

    In Buffer Overflow exploit, which of the following registers gets overwritten with return address of the exploit code?

    A. EEP

    B. ESP

    C. EAP

    D. EIP

  • Question 787:

    What does FIN in TCP flag define?

    A. Used to abort a TCP connection abruptly

    B. Used to close a TCP connection

    C. Used to acknowledge receipt of a previous packet or transmission

    D. Used to indicate the beginning of a TCP connection

  • Question 788:

    Joel and her team have been going through tons of garbage, recycled paper, and other rubbish in order to find some information about the target they are attempting to penetrate.

    How would you call this type of activity?

    A. Dumpster Diving

    B. Scanning

    C. CI Gathering

    D. Garbage Scooping

  • Question 789:

    Vulnerability mapping occurs after which phase of a penetration test?

    A. Host scanning

    B. Passive information gathering

    C. Analysis of host scanning

    D. Network level discovery

  • Question 790:

    In which of the following should be performed first in any penetration test?

    A. System identification

    B. Intrusion Detection System testing

    C. Passive information gathering

    D. Firewall testing

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V8 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.