Pre-Winter Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: big60

ECCouncil Updated 312-50 Exam Questions and Answers by ebony

Page: 15 / 20

ECCouncil 312-50 Exam Overview :

Exam Name: Certified Ethical Hacker Exam
Exam Code: 312-50 Dumps
Vendor: ECCouncil Certification: Certified Ethical Hacker
Questions: 614 Q&A's Shared By: ebony
Question 60

How does an operating system protect the passwords used for account logins?

Options:

A.

The operating system performs a one-way hash of the passwords.

B.

The operating system stores the passwords in a secret file that users cannot find.

C.

The operating system encrypts the passwords, and decrypts them when needed.

D.

The operating system stores all passwords in a protected segment of non-volatile memory.

Discussion
Question 61

Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between the two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric is relaying the information between the two. What would you call this attack?

Options:

A.

Interceptor

B.

Man-in-the-middle

C.

ARP Proxy

D.

Poisoning Attack

Discussion
Question 62

What is the following command used for?

net use \targetipc$ "" /u:""

Options:

A.

Grabbing the etc/passwd file

B.

Grabbing the SAM

C.

Connecting to a Linux computer through Samba.

D.

This command is used to connect as a null session

E.

Enumeration of Cisco routers

Discussion
Freddy
I passed my exam with flying colors and I'm confident who will try it surely ace the exam.
Aleksander Nov 26, 2025
Thanks for the recommendation! I'll check it out.
Stefan
Thank you so much Cramkey I passed my exam today due to your highly up to date dumps.
Ocean Nov 9, 2025
Agree….Cramkey Dumps are constantly updated based on changes in the exams. They also have a team of experts who regularly review the materials to ensure their accuracy and relevance. This way, you can be sure you're studying the most up-to-date information available.
Mylo
Excellent dumps with authentic information… I passed my exam with brilliant score.
Dominik Nov 3, 2025
That's amazing! I've been looking for good study material that will help me prepare for my upcoming certification exam. Now, I will try it.
Kingsley
Do anyone guide my how these dumps would be helpful for new students like me?
Haris Nov 17, 2025
Absolutely! They are highly recommended for anyone looking to pass their certification exam. The dumps are easy to understand and follow, making it easier for you to study and retain the information.
Question 63

It is a vulnerability in GNU's bash shell, discovered in September of 2014, that gives attackers access to run remote commands on a vulnerable system. The malicious software can take control of an infected machine, launch denial-of-service attacks to disrupt websites, and scan for other vulnerable devices (including routers).

Which of the following vulnerabilities is being described?

Options:

A.

Shellshock

B.

Rootshock

C.

Rootshell

D.

Shellbash

Discussion
Page: 15 / 20
Title
Questions
Posted

312-50
PDF

$42  $104.99

312-50 Testing Engine

$50  $124.99

312-50 PDF + Testing Engine

$66  $164.99