New Year Dumps Discount
Home / ECCouncil / CEH Certified Ethical Hacker Exams / 312-50 - Certified Ethical Hacker

ECCouncil 312-50 Test Dumps

Total Questions Answers: 765
Last Updated: 21-Jan-2025
Available with 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Online Test: $20 $80

PDF + Online Test: $25 $99


Check Our Recently Added 312-50 Practice Exam Questions


Question # 1



Rebecca is a security analyst and knows of a local root exploit that has the ability to
enable local users to use available exploits to gain root privileges. This vulnerability
exploits a condition in the Linux kernel within the execve() system call. There is no
known workaround that exists for this vulnerability. What is the correct action to be
taken by Rebecca in this situation as a recommendation to management?

A.

Rebecca should make a recommendation to disable the () system call

B.

 Rebecca should make a recommendation to upgrade the Linux kernel promptly

C.

 Rebecca should make a recommendation to set all child-process to sleep within the
execve()

D.

Rebecca should make a recommendation to hire more system administrators to monitor
all child processes to ensure that each child process can't elevate privilege




B.
  

 Rebecca should make a recommendation to upgrade the Linux kernel promptly







Question # 2



What is Cygwin?

A.

Cygwin is a free C++ compiler that runs on Windows

B.

 Cygwin is a free Unix subsystem that runs on top of Windows

C.

Cygwin is a free Windows subsystem that runs on top of Linux

D.

Cygwin is a X Windows GUI subsytem that runs on top of Linux GNOME environment




B.
  

 Cygwin is a free Unix subsystem that runs on top of Windows



Explanation: Cygwin is a Linux-like environment for Windows. It consists of two parts:
A DLL (cygwin1.dll) which acts as a Linux API emulation layer providing substantial Linux
API functionality.
A collection of tools which provide Linux look and feel.
The Cygwin DLL works with all non-beta, non "release candidate", ix86 32 bit versions of
Windows since Windows 95, with the exception of Windows CE.





Question # 3



John is discussing security with Jane. Jane had mentioned to John earlier that she
suspects an LKM has been installed on her server. She believes this is the reason
that the server has been acting erratically lately. LKM stands for Loadable Kernel
Module.
What does this mean in the context of Linux Security?

A.

Loadable Kernel Modules are a mechanism for adding functionality to a file system
without requiring a kernel recompilation.

B.

Loadable Kernel Modules are a mechanism for adding functionality to an operatingsystem
kernel after it has been recompiled and the system rebooted.

C.

 Loadable Kernel Modules are a mechanism for adding auditing to an operating-system
kernel without requiring a kernel recompilation.

D.

Loadable Kernel Modules are a mechanism for adding functionality to an operatingsystem
kernel without requiring a kernel recompilation.





D.
  

Loadable Kernel Modules are a mechanism for adding functionality to an operatingsystem
kernel without requiring a kernel recompilation.




Explanation: Loadable Kernel Modules, or LKM, are object files that contain code to
extend the running kernel, or so-called base kernel, without the need of a kernel
recompilation. Operating systems other than Linux, such as BSD systems, also provide
support for LKM's. However, the Linux kernel generally makes far greater and more
versatile use of LKM's than other systems. LKM's are typically used to add support for new
hardware, filesystems or for adding system calls. When the functionality provided by an
LKM is no longer required, it can be unloaded, freeing memory.





Question # 4



Joe the Hacker breaks into company’s Linux system and plants a wiretap program in
order to sniff passwords and user accounts off the wire. The wiretap program is
embedded as a Trojan horse in one of the network utilities. Joe is worried that
network administrator might detect the wiretap program by querying the interfaces
to see if they are running in promiscuous mode.
Running “ifconfig –a” will produce the following:
# ifconfig –a
1o0: flags=848<UP,LOOPBACK,RUNNING,MULTICAST> mtu 8232
inet 127.0.0.1 netmask ff000000hme0:
flags=863<UP,BROADCAST,NOTRAILERS,RUNNING,PROMISC,MULTICAST> mtu
1500
inet 192.0.2.99 netmask ffffff00 broadcast 134.5.2.255 ether
8:0:20:9c:a2:35
What can Joe do to hide the wiretap program from being detected by ifconfig
command?

A.

Block output to the console whenever the user runs ifconfig command by running screen
capture utiliyu

B.

Run the wiretap program in stealth mode from being detected by the ifconfig command.

C.

Replace original ifconfig utility with the rootkit version of ifconfig hiding Promiscuous
information being displayed on the console.

D.

You cannot disable Promiscuous mode detection on Linux systems.





C.
  

Replace original ifconfig utility with the rootkit version of ifconfig hiding Promiscuous
information being displayed on the console.



Explanation: The normal way to hide these rogue programs running on systems is the use
crafted commands like ifconfig and ls.





Question # 5



Bob is a Junior Administrator at ABC Company. On One of Linux machine he
entered the following firewall rules:
iptables –t filter –A INPUT -p tcp -dport 23 –j DROP
Why he entered the above line?

A.

To accept the Telnet connection

B.

 To deny the Telnet connection

C.

 The accept all connection except telnet connection

D.

None of Above





B.
  

 To deny the Telnet connection



Explanation:

-t, -table
This option specifies the packet matching table which the command should operate on. If
the kernel is configured with automatic module loading, an attempt will be made to load the
appropriate module for that table if it is not already there.
The tables are as follows: filter This is the default table, and contains the built-in chains
INPUT (for packets coming into the box itself), FORWARD (for packets being routed
through the box), and OUTPUT (for locally-generated packets). nat This table is consulted
when a packet which is creates a new connection is encountered. It consists of three builtins:
PREROUTING (for altering packets as soon as they come in), OUTPUT (for altering
locally-generated packets before routing), and POSTROUTING (for altering packets as
they are about to go out). mangle This table is used for specialized packet alteration. It has
two built-in chains: PREROUTING (for altering incoming packets before routing) and
OUTPUT (for altering locally-generated packets before routing).
-A, -append
Append one or more rules to the end of the selected chain. When the source and/or
destination names resolve to more than one address, a rule will be added for each possible
address combination.
-p, -protocol [!] protocol
The protocol of the rule or of the packet to check. The specified protocol can be one of tcp,
udp, icmp, or all, or it can be a numeric value, representing one of these protocols or a
different one. Also a protocol name from /etc/protocols is allowed. A "!" argument before
the protocol inverts the test. The number zero is equivalent to all. Protocol all will match
with all protocols and is taken as default when this option is omitted. All may not be used in combination with the check command.
-destination-port [!] [port[:port]]
Destination port or port range specification. The flag -dport is an alias for this option.
-j, -jump target
This specifies the target of the rule; ie. what to do if the packet matches it. The target can
be a user-defined chain (not the one this rule is in), one of the special builtin targets which
decide the fate of the packet immediately, or an extension (see EXTENSIONS below). If
this option is omitted in a rule, then matching the rule will have no effect on the packet's
fate, but the counters on the rule will be incremented.





Get 765 Certified Ethical Hacker questions Access in less then $0.12 per day.

ECCouncil Bundle 1:


1 Month PDF Access For All ECCouncil Exams with Updates
$100

$400

Buy Bundle 1

ECCouncil Bundle 2:


3 Months PDF Access For All ECCouncil Exams with Updates
$200

$800

Buy Bundle 2

ECCouncil Bundle 3:


6 Months PDF Access For All ECCouncil Exams with Updates
$300

$1200

Buy Bundle 3

ECCouncil Bundle 4:


12 Months PDF Access For All ECCouncil Exams with Updates
$400

$1600

Buy Bundle 4
Disclaimer: Fair Usage Policy - Daily 5 Downloads

Certified Ethical Hacker Exam Dumps


Exam Code: 312-50
Exam Name: Certified Ethical Hacker

  • 90 Days Free Updates
  • ECCouncil Experts Verified Answers
  • Printable PDF File Format
  • 312-50 Exam Passing Assurance

Get 100% Real 312-50 Exam Dumps With Verified Answers As Seen in the Real Exam. Certified Ethical Hacker Exam Questions are Updated Frequently and Reviewed by Industry TOP Experts for Passing CEH Certified Ethical Hacker Exams Exam Quickly and Hassle Free.

ECCouncil 312-50 Test Dumps


Struggling with Certified Ethical Hacker preparation? Get the edge you need! Our carefully created 312-50 test dumps give you the confidence to pass the exam. We offer:

1. Up-to-date CEH Certified Ethical Hacker Exams practice questions: Stay current with the latest exam content.
2. PDF and test engine formats: Choose the study tools that work best for you.
3. Realistic ECCouncil 312-50 practice exam: Simulate the real exam experience and boost your readiness.

Pass your CEH Certified Ethical Hacker Exams exam with ease. Try our study materials today!

Official Certified Ethical Hacker exam info is available on Eccouncil website at https://www.eccouncil.org/train-certify/certified-ethical-hacker-ceh/

Prepare your CEH Certified Ethical Hacker Exams exam with confidence!

We provide top-quality 312-50 exam dumps materials that are:

1. Accurate and up-to-date: Reflect the latest ECCouncil exam changes and ensure you are studying the right content.
2. Comprehensive Cover all exam topics so you do not need to rely on multiple sources.
3. Convenient formats: Choose between PDF files and online Certified Ethical Hacker practice questions for easy studying on any device.

Do not waste time on unreliable 312-50 practice test. Choose our proven CEH Certified Ethical Hacker Exams study materials and pass with flying colors. Try Dumps4free Certified Ethical Hacker 2024 material today!

  • Assurance

    Certified Ethical Hacker practice exam has been updated to reflect the most recent questions from the ECCouncil 312-50 Exam.

  • Demo

    Try before you buy! Get a free demo of our CEH Certified Ethical Hacker Exams exam dumps and see the quality for yourself. Need help? Chat with our support team.

  • Validity

    Our ECCouncil 312-50 PDF contains expert-verified questions and answers, ensuring you're studying the most accurate and relevant material.

  • Success

    Achieve 312-50 success! Our Certified Ethical Hacker exam questions give you the preparation edge.

If you have any question then contact our customer support at live chat or email us at support@dumps4free.com.