[Free] Download New Updated (February 2016) ECCouncil 312-50 Practice Tests 171-180



Nathan is testing some of his network devices. Nathan is using Macof to try and flood the ARP cache of these switches. If these switches’ ARP cache is successfully flooded, what will be the result?


A.     The switches will drop into hub mode if the ARP cache is successfully flooded.

B.     If the ARP cache is flooded, the switches will drop into pix mode making it less susceptible to attacks.

C.     Depending on the switch manufacturer, the device will either delete every entry in its ARP cache or reroute packets to the nearest switch.

D.     The switches will route all traffic to the broadcast address created collisions.


Correct Answer: A




You are programming a buffer overflow exploit and you want to create a NOP sled of 200 bytes in the program exploit.c.




What is the hexadecimal value of NOP instruction?


A.     0x60

B.     0x80

C.     0x70

D.     0x90


Correct Answer: D




This TCP flag instructs the sending system to transmit all buffered data immediately.


A.     SYN

B.     RST

C.     PSH

D.     URG

E.      FIN


Correct Answer: C










The network administrator at Spears Technology, Inc has configured the default gateway Cisco router’s access-list as below:




You are hired to conduct security testing on their network. You successfully brute-force the SNMP community string using a SNMP crack tool. The access-list configured at the router prevents you from establishing a successful connection. You want to retrieve the Cisco configuration from the router. How would you proceed?


A.     Use the Cisco’s TFTP default password to connect and download the configuration file.

B.     Run a network sniffer and capture the returned traffic with the configuration file from the router.

C.     Run Generic Routing Encapsulation (GRE) tunneling protocol from your computer to the router masking your IP address.

D.     Send a customized SNMP set request with a spoofed source IP address in the range


Correct Answer: BD




You work for Acme Corporation as Sales Manager. The company has tight network security restrictions. You are trying to steal data from the company’s Sales database (Sales.xls) and transfer them to your home computer. Your company filters and monitors traffic that leaves from the internal network to the Internet. How will you achieve this without raising suspicion?


A.     Encrypt the Sales.xls using PGP and e-mail it to your personal gmail account.

B.     Package the Sales.xls using Trojan wrappers and telnet them back your home computer.

C.     You can conceal the Sales.xls database in another file like photo.jpg or other files and send it out in an innocent looking email or file transfer using Steganography techniques.

D.     Change the extension of Sales.xls to sales.txt and upload them as attachment to your hotmail account.


Correct Answer: C




Study the snort rule given below and interpret the rule.


alert tcp any any –> 111 (content:”|00 01 86 a5|”; msg. “mountd access”;)


A.     An alert is generated when a TCP packet is generated from any IP on the subnet and destined to any IP on port 111.

B.     An alert is generated when any packet other than a TCP packet is seen on the network and destined for the subnet.

C.     An alert is generated when a TCP packet is originated from port 111 of any IP address to the subnet.

D.     An alert is generated when a TCP packet originating from any IP address is seen on the network and destined for any IP address on the subnet on port 111.


Correct Answer: D







What port number is used
by LDAP protocol?


A.     110

B.     389

C.     464

D.     445


Correct Answer: B




Fred is the network administrator for his company. Fred is testing an internal switch. From an external IP address, Fred wants to try and trick this switch into thinking it already has established a session with his computer. How can Fred accomplish this?


A.     Fred can accomplish this by sending an IP packet with the RST/SIN bit and the source address of his computer.

B.     He can send an IP packet with the SYN bit and the source address of his computer.

C.     Fred can send an IP packet with the ACK bit set to zero and the source address of the s

D.     Fred can send an IP packet to the switch with the ACK bit and the source address of his machine.


Correct Answer: D




Within the context of Computer Security, which of the following statements describes Social

Engineering best?


A.     Social Engineering is the act of publicly disclosing information.

B.     Social Engineering is the means put in place by human resource to perform time accounting.

C.     Social Engineering is the act of getting needed information from a person rather than breaking into a system.

D.     Social Engineering is a training program within sociology studies.


Correct Answer: C









In Trojan terminology, what is a covert channel?




A.     A channel that transfers information within a computer system or network in a way that violates the security policy.

B.     A legitimate communication path within a computer system or network for transfer of data.

C.     It is a kernel operation that hides boot processes and services to mask detection.

D.     It is Reverse tunneling technique that uses HTTPS protocol instead of HTTP protocol to establish connections.


Correct Answer: A


Free VCE & PDF File for ECCouncil 312-50 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in 312-50 Practice Tests (February 2016) and tagged , , , , . Bookmark the permalink.