312-50v9 Exam Questions - Online Test


312-50v9 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

Exam Code: 312-50v9 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Certified Ethical Hacker Exam
Certification Provider: EC-Council
Free Today! Guaranteed Training- Pass 312-50v9 Exam.

NEW QUESTION 1
You have successfully gained access to a linux server and would like to ensure that the succeeding outgoing traffic from the server will not be caught by a Network Based Intrusion Detection System (NIDS).
Which is the best way to evade the NIDS?

  • A. Out of band signaling
  • B. Encryption
  • C. Alternate Data Streams
  • D. Protocol Isolation

Answer: B

NEW QUESTION 2
What is the process of logging, recording, and resolving events that take place in an organization?

  • A. Metrics
  • B. Security Policy
  • C. Internal Procedure
  • D. Incident Management Process

Answer: D

NEW QUESTION 3
You have compromised a server and successfully gained a root access. You want to pivot and pass traffic undetected over the network and evade any possible Intrusion Detection System.
What is the best approach?

  • A. Install and use Telnet to encrypt all outgoing traffic from this server.
  • B. Install Cryptcat and encrypt outgoing packets from this server
  • C. Use Alternate Data Streams to hide the outgoing packets from this server.
  • D. Use HTTP so that all traffic can be routed via a browser, thus evading the internal Intrusion Detection Systems.

Answer: A

NEW QUESTION 4
You’ve just been hired to perform a pentest on an organization that has been subjected to a large-scale attack. The CIO is concerned with mitigating threats and vulnerabilities to totally eliminate risk.
What is one of the first thing you should to when the job?

  • A. Start the wireshark application to start sniffing network traffic.
  • B. Establish attribution to suspected attackers.
  • C. Explain to the CIO that you cannot eliminate all risk, but you will be able to reduce risk to acceptable levels.
  • D. Interview all employees in the company to rule out possible insider threats.

Answer: C

NEW QUESTION 5
This asymmetry cipther is based on factoring the product of two large prime numbers. What cipher is described above?

  • A. SHA
  • B. RC5
  • C. RSA
  • D. MD5

Answer: C

NEW QUESTION 6
You are logged in as a local admin on a Windows 7 system and you need to launch the Computer Management Console from command line.
Which command would you use?

  • A. c:services.msc
  • B. c:ncpa.cp
  • C. c:compmgmt.msc
  • D. c:gpedit

Answer: C

NEW QUESTION 7
Which of the following is a design pattern based on distinct pieces ofsoftware providing application functionality as services to other applications?

  • A. Lean Coding
  • B. Service Oriented Architecture
  • C. Object Oriented Architecture
  • D. Agile Process

Answer: B

NEW QUESTION 8
The purpose of a is to deny network access to local area networks and other information assets by unauthorized wireless devices.

  • A. Wireless Access Point
  • B. Wireless Analyzer
  • C. Wireless Access Control list
  • D. Wireless Intrusion Prevention System

Answer: D

NEW QUESTION 9
You are performing information gathering for an important penetration test. You have found pdf, doc, and images in your objective. You decide to extract metadata from these files and analyze it.
What tool will help you with the task?

  • A. Armitage
  • B. Dimitry
  • C. cdpsnarf
  • D. Metagoofil

Answer: D

NEW QUESTION 10
The phase will increase the odds of success in later phases of the penetration test. It is also the very first step in Information Gathering, and it will tell you what the“landscape” looks like.
What is the most important phase of ethical hacking in which you need to spend a considerable amount of time?

  • A. Network Mapping
  • B. Gaining access
  • C. Footprinting
  • D. Escalating privileges

Answer: C

NEW QUESTION 11
The chance of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from the last backup to the new hard disk. The recovery person earns $10/hour. Calculate theSLE, ARO, and ALE. Assume the EF = 1 (100%).
What is the closest approximate cost of this replacement and recovery operation per year?

  • A. $100
  • B. $146
  • C. 440
  • D. 1320

Answer: B

NEW QUESTION 12
It is a short-range wireless communication technology intended to replace the cables connecting portables of fixed deviceswhile maintaining high levels of security. It allows mobile phones, computers and other devices to connect and communicate using a short- range wireless connection.
Which of the following terms best matches the definition?

  • A. Bluetooth
  • B. Radio-Frequency Identification
  • C. WLAN
  • D. InfraRed

Answer: A

NEW QUESTION 13
Which of the following is not a Bluetooth attack?

  • A. Bluejacking
  • B. Bluedriving
  • C. Bluesnarfing
  • D. Bluesmaking

Answer: B

NEW QUESTION 14
The network administrator contacts you and tells you that she noticed the temperature on the internal wireless router increases by more than 20% during weekend hours when the office was closed. She asks you to investigate the issue because she is busy dealing with a big conference and she doesn’t have time to perform the task.
What tool can you use to view the network traffic being sent and received by the wireless router?

  • A. Netcat
  • B. Wireshark
  • C. Nessus
  • D. Netstat

Answer: B

NEW QUESTION 15
A hacker has successfully infected an internet-facing server, which he will then use to send junk mail, take part incoordinated attacks, or host junk email content.
Which sort of trojan infects this server?

  • A. Botnet Trojan
  • B. Banking Trojans
  • C. Ransomware Trojans
  • D. Turtle Trojans

Answer: A

NEW QUESTION 16
An Intrusion Detection System(IDS) has alerted the network administrator to a possibly malicious sequence of packets went to a Web server in the network’s external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file.
What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?

  • A. Protocol analyzer
  • B. Intrusion Prevention System (IPS)
  • C. Vulnerability scanner
  • D. Network sniffer

Answer: B

NEW QUESTION 17
PGP, SSL, and IKE are all examples of which type of cryptography?

  • A. Hash Algorithm
  • B. Secret Key
  • C. Public Key
  • D. Digest

Answer: :C

NEW QUESTION 18
Which of the following is a low-tech way of gaining unauthorized access to systems?

  • A. Sniffing
  • B. Social engineering
  • C. Scanning
  • D. Eavesdropping

Answer: B

NEW QUESTION 19
Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?

  • A. ESP confidential
  • B. AH Tunnel mode
  • C. ESP transport mode
  • D. AH permiscuous

Answer: C

NEW QUESTION 20
Which of the following isthe greatest threat posed by backups?

  • A. An un-encrypted backup can be misplaced or stolen
  • B. A back is incomplete because no verification was performed.
  • C. A backup is the source of Malware or illicit information.
  • D. A backup is unavailable duringdisaster recovery.

Answer: A

NEW QUESTION 21
The configuration allows a wired or wireless network interface controller to pass all trafice it receives to thecentral processing unit (CPU), rather than passing only the frames that the controller is intended to receive.
Which of the following is being described?

  • A. WEM
  • B. Multi-cast mode
  • C. Promiscuous mode
  • D. Port forwarding

Answer: B

NEW QUESTION 22
You are performing a penetration test. You achieved access via a bufferoverflow exploit and you proceed to find interesting data, such as files with usernames and passwords. You find a hidden folder that has the administrator’s bank account password and login information for the administrator’s bitcoin account.
What should you do?

  • A. Do not transfer the money but steal the bitcoins.
  • B. Report immediately to the administrator.
  • C. Transfer money from the administrator’s account to another account.
  • D. Do not report it and continue the penetration test.

Answer: B

NEW QUESTION 23
......

P.S. Certleader now are offering 100% pass ensure 312-50v9 dumps! All 312-50v9 exam questions have been updated with correct answers: https://www.certleader.com/312-50v9-dumps.html (125 New Questions)