Certified of 312-50v9 exam answers materials and questions for EC-Council certification for {examinee}, Real Success Guaranteed with Updated 312-50v9 pdf dumps vce Materials. 100% PASS Certified Ethical Hacker Exam exam Today!

NEW QUESTION 1
During a blackbox pen test you attempt to pass IRC traffic over post 80/TCP from a compromised web enabled host. The traffic gets blocked; however outbound HTTP traffic is unimpeded.
What type of firewall is inspecting outbound traffic?

  • A. Circuit
  • B. Packet Filtering
  • C. Application
  • D. Stateful

Answer: C

NEW QUESTION 2
Which of the following is a low-tech way of gaining unauthorized access to systems?

  • A. Sniffing
  • B. Social engineering
  • C. Scanning
  • D. Eavesdropping

Answer: B

NEW QUESTION 3
Which of the following statements regarding ethical hacking is incorrect?

  • A. Testing should be remotely performed offsite.
  • B. Ethical hackers should never use tools that have potential of exploiting vulnerabilities in theorganizations IT system.
  • C. Ethical hacking should not involve writing to or modifying the target systems.
  • D. An organization should use ethical hackers who do not sell hardware/software or other consulting services.

Answer: B

NEW QUESTION 4
A new wireless client is configured to join a 802.11 network. Thisclient uses the same hardware and software as many of the other clients on the network. The client can see the network, but cannot connect. A wireless packet sniffer shows that the Wireless Access Point (WAP) is not responding to the association requests being sent by the wireless client.
What is a possible source of this problem?

  • A. The client cannot see the SSID of the wireless network
  • B. The wireless client is not configured to use DHCP
  • C. The WAP does not recognize the client's MAC address
  • D. Client isconfigured for the wrong channel

Answer: C

NEW QUESTION 5
Using Windows CMD, how would an attacker list all the shares to which the current user context hasaccess?

  • A. NET CONFIG
  • B. NET USE
  • C. NET FILE
  • D. NET VIEW

Answer: D

NEW QUESTION 6
Which of the following parameters describe LM Hash: I – The maximum password length is 14 characters.
II – There are no distinctions between uppercase and lowercase.
III – It’s a simple algorithm, so 10,000,000 hashes can be generated per second.

  • A. I
  • B. I and II
  • C. II
  • D. I, II and III

Answer: D

NEW QUESTION 7
Which of the followingtypes of firewalls ensures that the packets are part of the established session?

  • A. Switch-level firewall
  • B. Stateful inspection firewall
  • C. Application-level firewall
  • D. Circuit-level firewall

Answer: B

NEW QUESTION 8
In Risk Management, how is the term “likelihood” related to the concept of “threat?”

  • A. Likelihood is the probability that a vulnerability is a threat-source.
  • B. Likelihood is a possible threat-source that may exploit a vulnerability.
  • C. Likelihood is the likely source of a threat that could exploit a vulnerability.
  • D. Likelihood is the probability that a threat-source will exploit a vulnerability.

Answer: D

NEW QUESTION 9
After trying multiple exploits, you’ve gained root access to a Centos 6 answer. To ensure you maintain access. What would you do first?

  • A. Disable IPTables
  • B. Create User Account
  • C. Downloadand Install Netcat
  • D. Disable Key Services

Answer: C

NEW QUESTION 10
Which of the following tools is used to analyze the files produced by several packet-capture programs such as tcpdump, WinDump, Wireshark,and EtherPeek?

  • A. Nessus
  • B. Tcptraceroute
  • C. Tcptrace
  • D. OpenVAS

Answer: C

NEW QUESTION 11
Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?

  • A. ESP confidential
  • B. AH Tunnel mode
  • C. ESP transport mode
  • D. AH permiscuous

Answer: C

NEW QUESTION 12
You have compromised a server on a network and successfully open a shell. You aimed to identify all operating systems running on the network. However, as you attemptto fingerprint all machines in the machines in the network using the nmap syntax below, it is not going through.
invictus@victim_server:~$nmap –T4 –O 10.10.0.0/24
TCP/IP fingerprinting (for OS scan) xxxxxxx xxxxxx xxxxxxxxxx. QUITTING!
What seems to be wrong?

  • A. The outgoing TCP/IP fingerprinting is blocked by the host firewall.
  • B. This is a common behavior for a corrupted nmap application.
  • C. OS Scan requires root privileged.
  • D. The nmap syntax is wrong.

Answer: D

NEW QUESTION 13
To maintain compliance with regulatory requirements, a security audit of the systems on a network must be performed to determine their compliance with security policies. Which one of the following tools would most likely be used in such as audit?

  • A. Port scanner
  • B. Protocol analyzer
  • C. Vulnerability scanner
  • D. Intrusion Detection System

Answer: C

NEW QUESTION 14
Which of these options is the most secure procedure for strong backup tapes?

  • A. In a climate controlled facility offsite
  • B. Inside the data center for faster retrieval in afireproof safe
  • C. In a cool dry environment
  • D. On a different floor in the same building

Answer: A

NEW QUESTION 15
Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGI's?

  • A. Snort
  • B. Dsniff
  • C. Nikto
  • D. John the Ripper

Answer: C

NEW QUESTION 16
Port scanning can be used as part of a technical assessment to determine network vulnerabilities. The TCP XMAS scan is used to identify listening port on the targeted system.
If a scanned port is open, what happens?

  • A. The port will ignore the packets.
  • B. The port will send an RST.
  • C. The port will send an ACK.
  • D. The port will send a SYN.

Answer: A

NEW QUESTION 17
Which of the following is the structure designed to verify and authenticate the identity of individuals within the enterprise taking part in a data exchange?

  • A. PKI
  • B. biometrics
  • C. SOA
  • D. single sign on

Answer: A

NEW QUESTION 18
This tool is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attach along with some optimizations like Korek attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools.
Which of the following tools is being described?

  • A. Wificracker
  • B. WLAN-crack
  • C. Airguard
  • D. Aircrack-ng

Answer: D

NEW QUESTION 19
Perspective clients wantto see sample reports from previous penetration tests. What should you do next?

  • A. Share full reports, not redacted.
  • B. Share full reports, with redacted.
  • C. Decline but, provide references.
  • D. Share reports, after NDA is signed.

Answer: B

NEW QUESTION 20
The heartland bug was discovered in 2014 and is widely referred to under MITRE’s Common Vulnerabilities and Exposures (CVE) as CVE-2004-1060. Thisbug affects the OpenSSL implementation of the transport Layer security (TLS) protocols defined in RFC6520.
What types of key does this bug leave exposed to the Internet making exploitation of any compromised system very easy?

  • A. Root
  • B. Private
  • C. Shared
  • D. Public

Answer: A

NEW QUESTION 21
Which tool allows analysis and pen testers to examine links between data using graphs and link analysis?

  • A. Metasploit
  • B. Maltego
  • C. Wireshark
  • D. Cain &Abel

Answer: B

NEW QUESTION 22
You work as a Security Analyst for a retail organization. In securing the company's network, you set up a firewall and an IDS. However, hackers are able to attack the network. After investigating, you discover that your IDS is not configured properly and therefore is unable to trigger alarms when needed. What type of alert is the IDS giving?

  • A. False Negative
  • B. True Negative
  • C. True Positive
  • D. False Positive

Answer: A

NEW QUESTION 23
The “white box testing” methodology enforces what kind of restriction?

  • A. The internal operation of a system is completely known to the tester.
  • B. Only the internal operation of a system is known to the tester.
  • C. Only the external operation of a system is accessible to the tester.
  • D. The internal operation of a system is only partly accessible to the tester.

Answer: A

NEW QUESTION 24
PGP, SSL, and IKE are all examples of which type of cryptography?

  • A. Hash Algorithm
  • B. Secret Key
  • C. Public Key
  • D. Digest

Answer: :C

NEW QUESTION 25
......

P.S. Easily pass 312-50v9 Exam with 125 Q&As Simply pass Dumps & pdf Version, Welcome to Download the Newest Simply pass 312-50v9 Dumps: https://www.simply-pass.com/EC-Council-exam/312-50v9-dumps.html (125 New Questions)