Exam Details

  • Exam Code
    :312-50V8
  • Exam Name
    :Certified Ethical Hacker v8
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :1008 Q&As
  • Last Updated
    :Apr 24, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V8 Questions & Answers

  • Question 911:

    You just set up a security system in your network. In what kind of system would you find thefollowing string of characters used as a rule within its configuration?

    alert tcp any any ->192.168.100.0/24 21 (msg: "FTP on the network!";)

    A. A firewall IPTable

    B. A Router IPTable

    C. An Intrusion Detection System

    D. FTP Server rule

  • Question 912:

    The purpose of a ____________ is to deny network access to local area networks and other information assets by unauthorized wireless devices.

    A. Wireless Access Point

    B. Wireless Analyzer

    C. Wireless Access Control list

    D. Wireless Intrusion Prevention System

  • Question 913:

    While performing online banking using a web browser, a user receives an email that contains alink to an interesting Web site. When the user clicks on the link, another web browser session starts and displays a video of cats playing a piano. The next business day, the user receives what looks like an email from his bank, indicating that his bank account has been accessed from a foreign country. The email asks the user to call his bank and verify the authorization of a funds transfer that took place.

    What web browser-based security vulnerability was exploited to compromise the user?

    A. Cross-Site Request Forgery

    B. Cross-Site Scripting

    C. Web form input validation

    D. Clickjacking

  • Question 914:

    Which of the following parameters describe LM Hash:

    I -The maximum password length is 14 characters.

    II -There are no distinctions between uppercase and lowercase.

    III -It's a simple algorithm, so 10,000,000 hashes can be generated per second.

    A. I

    B. I and II

    C. II

    D. I, II and III

  • Question 915:

    You are the Systems Administrator for a large corporate organization. You need to monitor all network traffic on your local network for suspicious activities and receive notifications when an attack is occurring. Which tool would allow you to accomplish this goal?

    A. Host-based IDS

    B. Firewall

    C. Network-Based IDS

    D. Proxy

  • Question 916:

    Which of the following tools can be used for passiveOS fingerprinting?

    A. tcpdump

    B. ping

    C. nmap

    D. Tracert

  • Question 917:

    env x= `(){ :;};echo exploit ` bash -c `cat/etc/passwd

    What is the Shellshock bash vulnerability attempting to do on an vulnerable Linux host?

    A. Add new user to the passwd file

    B. Display passwd contents to prompt

    C. Change all password in passwd

    D. Remove the passwd file.

  • Question 918:

    An Intrusion Detection System(IDS) has alerted the network administrator to a possibly malicious sequence of packets went to a Web server in the network's external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file.

    What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?

    A. Protocol analyzer

    B. Intrusion Prevention System (IPS)

    C. Vulnerability scanner

    D. Network sniffer

  • Question 919:

    The heartland bug was discovered in 2014 and is widely referred to under MITRE's Common Vulnerabilities and Exposures (CVE) as CVE-2004-1060. Thisbug affects the OpenSSL implementation of the transport Layer security (TLS) protocols defined in RFC6520.

    What types of key does this bug leave exposed to the Internet making exploitation of any compromised system very easy?

    A. Root

    B. Private

    C. Shared

    D. Public

  • Question 920:

    You have several plain-text firewall logs that you must review to evaluate network traffic. You know that in order to do this fast and efficiently you must user regular expressions.

    Which command-line utility are you most likely to use?

    A. Notepad

    B. MS Excel

    C. Grep

    D. Relational Database

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V8 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.