[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil 312-50 Dumps with VCE and PDF 71-80

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released 312-50
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures

Question No: 71 – (Topic 3)

John has scanned the web server with NMAP. However, he could not gather enough information to help him identify the operating system running on the remote host accurately.

What would you suggest to John to help identify the OS that is being used on the remote web server?

  1. Connect to the web server with a browser and look at the web page.

  2. Connect to the web server with an FTP client.

  3. Telnet to port 8080 on the web server and look at the default page code.

  4. Telnet to an open port and grab the banner.

Answer: D

Explanation: Most people don’t care about changing the banners presented by applications listening to open ports and therefore you should get fairly accurate information when grabbing banners from open ports with, for example, a telnet application.

Question No: 72 – (Topic 3)

Which FTP transfer mode is required for FTP bounce attack?

  1. Active Mode

  2. Passive Mode

  3. User Mode

  4. Anonymous Mode

Answer: B

Explanation: FTP bounce attack needs the server the support passive connections and

the client program needs to use PORT command instead of the PASV command.

Question No: 73 – (Topic 3)

While reviewing the result of scanning run against a target network you come across the following:

Ensurepass 2018 PDF and VCE

Which among the following can be used to get this output?

  1. A Bo2k system query.

  2. nmap protocol scan

  3. A sniffer

  4. An SNMP walk

Answer: D

Explanation: SNMP lets you quot;readquot; information from a device. You make a query of the server (generally known as the quot;agentquot;). The agent gathers the information from the host system and returns the answer to your SNMP client. It#39;s like having a single interface for all your informative Unix commands. Output like system.sysContact.0 is called a MIB.

Question No: 74 – (Topic 3)

What are two things that are possible when scanning UDP ports? (Choose two.

  1. A reset will be returned

  2. An ICMP message will be returned

  3. The four-way handshake will not be completed

  4. An RFC 1294 message will be returned

  5. Nothing

Answer: B,E

Explanation: Closed UDP ports can return an ICMP type 3 code 3 message. No response can mean the port is open or the packet was silently dropped.

Question No: 75 – (Topic 3)

Ann would like to perform a reliable scan against a remote target. She is not concerned about being stealth at this point.

Which of the following type of scans would be the most accurate and reliable option?

  1. A half-scan

  2. A UDP scan

  3. A TCP Connect scan

  4. A FIN scan

Answer: C

Explanation: A TCP Connect scan, named after the Unix connect() system call is the most accurate scanning method. If a port is open the operating system completes the TCP three- way handshake, and the port scanner immediately closes the connection. Otherwise an error code is returned.

Example of a three-way handshake followed by a reset: Source Destination Summary


[] [] TCP: D=80 S=49389 SYN SEQ=3362197786 LEN=0 WIN=5840

[] [] TCP: D=49389 S=80 SYN ACK=3362197787 SEQ=58695210 LEN=0 WIN=65535

[] [] TCP: D=80 S=49389 ACK=58695211 WINlt;lt;2=5840 [] [] TCP: D=80 S=49389 RST ACK=58695211 WINlt;lt;2=5840

Question No: 76 – (Topic 3)

Which of the following command line switch would you use for OS detection in Nmap?

  1. -D

  2. -O

  3. -P

  4. -X

Answer: B

Explanation: OS DETECTION: -O: Enable OS detection (try 2nd generation w/fallback to 1st) -O2: Only use the new OS detection system (no fallback) -O1: Only use the old (1st generation) OS detection system -osscan-limit: Limit OS detection to promising targets – osscan-guess: Guess OS more aggressively

Question No: 77 – (Topic 3)

A distributed port scan operates by:

  1. Blocking access to the scanning clients by the targeted host

  2. Using denial-of-service software against a range of TCP ports

  3. Blocking access to the targeted host by each of the distributed scanning clients

  4. Having multiple computers each scan a small number of ports, then correlating the results

Answer: D

Explanation: Think of dDoS (distributed Denial of Service) where you use a large number of computers to create simultaneous traffic against a victim in order to shut them down.

Question No: 78 – (Topic 3)

What ICMP message types are used by the ping command?

  1. Timestamp request (13) and timestamp reply (14)

  2. Echo request (8) and Echo reply (0)

  3. Echo request (0) and Echo reply (1)

  4. Ping request (1) and Ping reply (2)

Answer: B

Explanation: ICMP Type 0 = Echo Reply, ICMP Type 8 = Echo

Question No: 79 – (Topic 3)

Jenny a well known hacker scanning to remote host of using nmap. She got the scanned output but she saw that 25 port states is filtered. What is the meaning of filtered port State?

  1. Can Accessible

  2. Filtered by firewall

  3. Closed

  4. None of above

Answer: B

Explanation: The state is either open, filtered, closed, or unfiltered. Filtered means that a firewall, filter, or other network obstacle is blocking the port so that Nmap cannot tell whether it is open or closed.

Question No: 80 – (Topic 3)

You want to know whether a packet filter is in front of Pings to don#39;t get answered. A basic nmap scan of seems to hang without returning any information. What should you do next?

  1. Use NetScan Tools Pro to conduct the scan

  2. Run nmap XMAS scan against

  3. Run NULL TCP hping2 against

  4. The firewall is blocking all the scans to

Answer: C

100% Ensurepass Free Download!
Download Free Demo:312-50 Demo PDF
100% Ensurepass Free Guaranteed!
312-50 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.