Category Archives: CEH Dumps

Updated EC-Council CEH 312-50v8 PDF & VCE Free Download Now (71-80)

QUESTION 71
_____________ is a type of symmetric-key encryption algorithm that transforms a fixed-length block of plaintext (unencrypted text) data into a block of ciphertext (encrypted text) data of the same length.

Continue reading

Updated EC-Council CEH 312-50v8 PDF & VCE Free Download Now (61-70)

QUESTION 61
LAN Manager Passwords are concatenated to 14 bytes, and split in half. The two halves are hashed individually. If the password is 7 characters or less, than the second half of the hash is always:

Continue reading

Updated EC-Council CEH 312-50v8 PDF & VCE Free Download Now (51-60)

QUESTION 51
While testing web applications, you attempt to insert the following test script into the search area on the company’s web site:

<script>alert(‘Testing Testing Testing’)</script>

Later, when you press the search button, a pop up box appears on your screen with the text “Testing Testing Testing”. What vulnerability is detected in the web application here?

Continue reading

Updated EC-Council CEH 312-50v8 PDF & VCE Free Download Now (41-50)

QUESTION 41
Lee is using Wireshark to log traffic on his network. He notices a number of packets being directed to an internal IP from an outside IP where the packets are ICMP and their size is around 65, 536 bytes.
What is Lee seeing here?

Continue reading

Updated EC-Council CEH 312-50v8 PDF & VCE Free Download Now (31-40)

QUESTION 31
Bob has set up three web servers on Windows Server 2008 IIS 7.0. Bob has followed all the recommendations for securing the operating system and IIS. These servers are going to run numerous e-commerce websites that are projected to bring in thousands of dollars a day. Bob is still concerned about the security of these servers because of the potential for financial loss. Bob has asked his company’s firewall administrator to set the firewall to inspect all incoming traffic on ports 80 and 443 to ensure that no malicious data is getting into the network. Why will this not be possible?

A.    Firewalls cannot inspect traffic coming through port 443
B.    Firewalls can only inspect outbound traffic
C.    Firewalls cannot inspect traffic at all, they can only block or allow certain ports
D.    Firewalls cannot inspect traffic coming through port 80

Answer: C

Continue reading

Updated EC-Council CEH 312-50v8 PDF & VCE Free Download Now (21-30)

QUESTION 21
Ursula is a college student at a University in Amsterdam. Ursula originally went to college to study engineering but later changed to marine biology after spending a month at sea with her friends. These friends frequently go out to sea to follow and harass fishing fleets that illegally fish in foreign waters. Ursula eventually wants to put companies practicing illegal fishing out of business. Ursula decides to hack into the parent company’s computers and destroy critical data knowing fully well that, if caught, she probably would be sent to jail for a very long time. What would Ursula be considered?

A.    Ursula would be considered a gray hat since she is performing an act against illegal activities.
B.    She would be considered a suicide hacker.
C.    She would be called a cracker.
D.    Ursula would be considered a black hat.

Answer: B

Continue reading

Updated EC-Council CEH 312-50v8 PDF & VCE Free Download Now (11-20)

QUESTION 11
What type of Trojan is this?

A.    RAT Trojan
B.    E-Mail Trojan
C.    Defacement Trojan
D.    Destructing Trojan
E.    Denial of Service Trojan

Answer: C

Continue reading

Updated EC-Council CEH 312-50v8 PDF & VCE Free Download Now (1-10)

QUESTION 1
David is a security administrator working in Boston. David has been asked by the office’s manager to block all POP3 traffic at the firewall because he believes employees are spending too much time reading personal email. How can David block POP3 at the firewall?

A.    David can block port 125 at the firewall.
B.    David can block all EHLO requests that originate from inside the office.
C.    David can stop POP3 traffic by blocking all HELO requests that originate from inside the office.
D.    David can block port 110 to block all POP3 traffic.

Answer: D

Continue reading