Latest ECCouncil 312-50v8 Real Exam Download 171-180



Nathan is testing some of his network devices. Nathan is using Macof to try and flood the ARP cache of these switches. If these switches’ ARP cache is successfully flooded, what will be the result?


A. The switches will drop into hub mode if the ARP cache is successfully flooded.

B. If the ARP cache is flooded,the switches will drop into pix mode making it less susceptible to attacks.

C. Depending on the switch manufacturer,the device will either delete every entry in its ARP cache or reroute packets to the nearest switch.

D. The switches will route all traffic to the broadcast address created collisions.


Answer: A 




You are programming a buffer overflow exploit and you want to create a NOP sled of 200 bytes in the program exploit.c


What is the hexadecimal value of NOP instruction?


A. 0x60

B. 0x80

C. 0x70

D. 0x90


Answer: D 




This TCP flag instructs the sending system to transmit all buffered data immediately.








Answer: C 




The network administrator at Spears Technology, Inc has configured the default gateway Cisco router’s access-list as below:


You are hired to conduct security testing on their network. You successfully brute-force the SNMP community string using a SNMP crack tool. The access-list configured at the router prevents you from establishing a successful connection. You want to retrieve the Cisco configuration from the router. How would you proceed?


A. Use the Cisco’s TFTP default password to connect and download the configuration file

B. Run a network sniffer and capture the returned traffic with the configuration file from the router

C. Run Generic Routing Encapsulation (GRE) tunneling protocol from your computer to the router masking your IP address

D. Send a customized SNMP set request with a spoofed source IP address in the range –


Answer: B,D 




You work for Acme Corporation as Sales Manager. The company has tight network security restrictions. You are trying to steal data from the company’s Sales database (Sales.xls) and transfer them to your home computer. Your company filters and monitors traffic that leaves from the internal network to the Internet. How will you achieve this without raising suspicion?


A. Encrypt the Sales.xls using PGP and e-mail it to your personal gmail account

B. Package the Sales.xls using Trojan wrappers and telnet them back your home computer

C. You can conceal the Sales.xls database in another file like photo.jpg or other files and send it out in an innocent looking email or file transfer using Steganography techniques

D. Change the extension of Sales.xls to sales.txt and upload them as attachment to your hotmail account


Answer: C 




Study the snort rule given below and interpret the rule.

alert tcp any any –> 111 (content:"|00 01 86 a5|"; msG. "mountd access";)


A. An alert is generated when a TCP packet is generated from any IP on the subnet and destined to any IP on port 111

B. An alert is generated when any packet other than a TCP packet is seen on the network and destined for the subnet

C. An alert is generated when a TCP packet is originated from port 111 of any IP address to the subnet

D. An alert is generated when a TCP packet originating from any IP address is seen on the network and destined for any IP address on the subnet on port 111


Answer: D 




What port number is used by LDAP protocol?


A. 110

B. 389

C. 464

D. 445


Answer: B 




Fred is the network administrator for his company. Fred is testing an internal switch. From an external IP address, Fred wants to try and trick this switch into thinking it already has established a session with his computer. How can Fred accomplish this?


A. Fred can accomplish this by sending an IP packet with the RST/SIN bit and the source address of his computer.

B. He can send an IP packet with the SYN bit and the source address of his computer.

C. Fred can send an IP packet with the ACK bit set to zero and the source address of the switch.

D. Fred can send an IP packet to the switch with the ACK bit and the source address of his machine.


Answer: D 




Within the context of Computer Security, which of the following statements describes Social Engineering best?


A. Social Engineering is the act of publicly disclosing information B. Social Engineering is the means put in place by human resource to perform time accounting

C. Social Engineering is the act of getting needed information from a person rather than breaking into a system

D. Social Engineering is a training program within sociology studies


Answer: C 




In Trojan terminology, what is a covert channel?


A. A channel that transfers information within a computer system or network in a way that violates the security policy

B. A legitimate communication path within a computer system or network for transfer of data

C. It is a kernel operation that hides boot processes and services to mask detection

D. It is Reverse tunneling technique that uses HTTPS protocol instead of HTTP protocol to establish connections


Answer: A 



Download Latest ECCouncil 312-50v8 Real Free Tests , help you to pass exam 100%.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.