Perimeter testing means determining exactly what your firewall blocks and what it allows. To conduct a good test, you can spoof source IP addresses and source ports. Which of the following command results in packets that will appear to originate from the system at Such a packet is useful for determining whether the firewall is allowing random packets in or out of your network.


A.     hping3 -T -S netbios -c 2 -p 80

B.     hping3 -Y -S windows -c 2 -p 80

C.     hping3 -O -S server -c 2 -p 80

D.     hping3 -a -S springfield -c 2 -p 80


Correct Answer: D




The GET method should never be used when sensitive data such as credit card is being sent to a CGI program. This is because any GET command will appear in the URL, and will be logged by any servers. For example, let’s say that you’ve entered your credit card information into a form that uses the GET method. The URL may appear like this:




The GET method appends the credit card number to the URL. This means that anyone with access to a server log will be able to obtain this information. How would you protect from this type of attack?


A.     Never include sensitive information in a script.

B.     Use HTTPS SSLv3 to send the data instead of plain HTTPS.

C.     Replace the GET with POST method when sending data.

D.     Encrypt the data before you send using GET method.


Correct Answer: C













Keystroke logging is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.




How will you defend against hardware keyloggers when using public computers and Internet Kiosks? (Select 4 answers)


A.     Alternate between typing the login credentials and typing characters somewhere else in the focus window.

B.     Type a wrong password first, later type the correct password on the login page defeating the keylogger recording.

C.     Type a password beginning with the last letter and then using the mouse to move the cursor for each subsequent letter.

D.     The next key typed replaces selected text portion. E.g. if the password is “secret”, one could type “s”, then some dummy keys “asdfsd”. Then these dummies could be selected with mouse, and next character from the password “e” is typed, which replaces the dummies “asdfsd”.

E.      The next key typed replaces selected text portion. E.g. if the password is “secret”, one could type “s”, then some dummy keys “asdfsd”. Then these dummies could be selected with mouse, and next character from the password “e” is typed, which replaces the dummies “asdfsd”.


Correct Answer: ACDE




Lauren is performing a network audit for her entire company. The entire network is comprised of around 500 computers. Lauren starts an ICMP ping sweep by sending one IP packet to the broadcast address of the network, but only receives responses from around five hosts. Why did this ping sweep only produce a few responses?


A.     Only Windows systems will reply to this scan.

B.     A switched network will not respond to packets sent to the broadcast address.

C.     Only Linux and Unix-like (Non-Windows) systems will reply to this scan.

D.     Only servers will reply to this scan.


Correct Answer: C




Wayne is the senior security analyst for his company. Wayne is examining some traffic logs on a server and came across some inconsistencies. Wayne finds some IP packets from a computer purporting to be on the internal network. The packets originate from with a TTL of 15. The server replied to this computer and received a response from with a TTL of 21. What can Wayne infer from this traffic log?


A.     The initial traffic from was being spoofed.

B.     The traffic from is from a Linux computer.

C. &nbs
The TTL of 21 means that the client computer is on wireless.

D.     The client computer at is a zombie computer.


Correct Answer: A





What type of port scan is shown below?




A.     Idle Scan

B.     Windows Scan

C.     XMAS Scan

D.     SYN Stealth Scan


Correct Answer: C




Here is the ASCII Sheet.







You want to guess the DBO username juggyboy (8 characters) using Blind SQL Injection technique. What is the correct syntax?












Correct Answer: A




How do you defend against ARP Poisoning attack? (Select 2 answers)




A.     Enable DHCP Snooping Binding Table

B.     Restrict ARP Duplicates

C.     Enable Dynamic ARP Inspection

D.     Enable MAC snooping Table


Correct Answer: AC




You are the security administrator for a large network. You want to prevent attackers from running any sort of traceroute into your DMZ and discovering the internal structure of publicly accessible areas of the network. How can you achieve this?


A.     There is no way to completely block tracerouting into this area.

B.     Block UDP at the firewall.

C.     Block TCP at the firewall.

D.     Block ICMP at the firewall.


Correct Answer: A




Neil is an IT security consultant working on contract for Davidson Avionics. Neil has been hired to audit the network of Davidson Avionics. He has been given permission to perform any tests necessary. Neil has created a fake company ID badge and uniform. Neil waits by one of the company’s entrance doors and
follows an employee into the office after they use their valid access card to gain entrance. What type of social engineering attack has Neil employed here?


A.     Neil has used a tailgating social engineering attack to gain access to the offices.

B.     He has used a piggybacking technique to gain unauthorized access.

C.     This type of social engineering attack is called man trapping.

D.     Neil is using the technique of reverse social engineering to gain access to the offices of Davidson Avionics.


Correct Answer: A


Free VCE & PDF File for ECCouncil 312-50 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.