[Free] Download New Updated (February 2016) ECCouncil 312-50 Practice Tests 531-540



Your lab partner is trying to find out more information about a competitors web site. The site has a .com extension. She has decided to use some online whois tools and look in one of the regional

Internet registrys. Which one would you suggest she looks in first?



B.     ARIN

C.     APNIC

D.     RIPE

E.      AfriNIC


Correct Answer: B




Network Administrator Patricia is doing an audit of the network. Below are some of her findings concerning DNS. Which of these would be a cause for alarm? Select the best answer.


A.     There are two external DNS Servers for Internet domains. Both are AD

B.     All external DNS is done by an ISP.

C.     Internal AD Integrated DNS servers are using private DNS names that are unregistered.

D.     Private IP addresses are used on the internal network and are registered with the internal AD integrated DNS server.


Correct Answer: A




Doug is conducting a port scan of a target network. He knows that his client target network has a web server and that there is a mail server also which is up and running. Doug has been sweeping the network but has not been able to elicit any response from the remote target. Which of the following could be the most likely cause behind this lack of response? Select 4.


A.     UDP is filtered by a gateway.

B.     The packet TTL value is too low and cannot reach the target.

C.     The host might be down.

D.     The destination network might be down.

E.      The TCP windows size does not match.

F.      ICMP is filtered by a gateway.


Correct Answer: BCDF




Joe Hacker runs the hping2 hacking tool to predict the target host’s sequence numbers in one of the hacking session. What does the first and second column mean? Select two.




A.     The first column reports the sequence number.

B.     The second column reports the difference between the current and last sequence number.

C.     The second column reports the next sequence number.

D.     The first column reports the difference between current and last sequence number.


Correct Answer: AB




While performing a ping sweep of a subnet you receive an ICMP reply of Code 3/Type 13 for all the pings sent out. What is the most likely cause behind this response?


A.     The firewall is dropping the packets.

B.     An in-line IDS is dropping the packets.

C.     A router is blocking ICMP.

D.     The host does not respond to ICMP packets.


Correct Answer: C




The following excerpt is taken from a honeypot log. The log captures activities across three days. There are several intrusion attempts; however, a few are successful. Study the log given below and answer the following question:


(Note: The objective of this questions is to test whether the student has learnt about passive OS fingerprinting (which should tell them the OS from log captures): can they tell a SQL injection attack signature; can they infer if a user ID has been created by an attacker and whether they can read plain source – destination entries from log entries.)




What can you infer from the above log?


A.     The system is a windows system which is being scanned unsuccessfully.

B.     The system is a web application server compromised through SQL injection.

C.     The system has been compromised and backdoored by the attacker.

D.     The actual IP of the successful attacker is


Correct Answer: A




Bob has been hired to perform a penetration test on XYZ.com. He begins by looking at IP address ranges owned by the company and details of domain name registration. He then goes to News Groups and financial web sites to see if they are leaking any sensitive information of have any technical details online. Within the context of penetration testing methodology, what phase is Bob involved with?


A.     Passive information gathering

B.     Active information gathering

C.     Attack phase

D.     Vulnerability Mapping


Correct Answer: A




Which of the following would be the best reason for sending a single SMTP message to an address that does not exist within the target company?


A.     To create a denial of service attack.

B.     To verify information about the mail administrator and his address.

C.     To gather information about internal hosts used in email treatment.

D.     To gather information about procedures that are in place to deal with such messages.


Correct Answer: C




You are conducting a port scan on a subnet that has ICMP blocked. You have discovered 23 live systems and after scanning each of them you notice that they all show port 21 in closed state. What should be the next logical step that should be performed?


A.     Connect to open ports to discover applications.

B.     Perform a ping sweep to identify any additional systems that might be up.

C.     Perform a SYN scan on port 21 to identify any additional systems that might be up.

D.     Rescan every computer to verify the results.


Correct Answer: C




Ann would like to perform a reliable scan against a remote target. She is not concerned about being stealth at this point. Which of the following type of scans would be the most accurate and reliable option?


A.     A half-scan

B.     A UDP scan

C.     A TCP Connect scan

D.     A FIN scan


Correct Answer: C


Free VCE & PDF File for ECCouncil 312-50 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in 312-50 Practice Tests (February 2016) and tagged , , , , . Bookmark the permalink.