Exam Code: 312-50v9 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Certified Ethical Hacker Exam
Certification Provider: EC-Council
Free Today! Guaranteed Training- Pass 312-50v9 Exam.
NEW QUESTION 1
You have successfully gained access to a linux server and would like to ensure that the succeeding outgoing traffic from the server will not be caught by a Network Based Intrusion Detection System (NIDS).
Which is the best way to evade the NIDS?
Answer: B
NEW QUESTION 2
What is the process of logging, recording, and resolving events that take place in an organization?
Answer: D
NEW QUESTION 3
You have compromised a server and successfully gained a root access. You want to pivot and pass traffic undetected over the network and evade any possible Intrusion Detection System.
What is the best approach?
Answer: A
NEW QUESTION 4
You’ve just been hired to perform a pentest on an organization that has been subjected to a large-scale attack. The CIO is concerned with mitigating threats and vulnerabilities to totally eliminate risk.
What is one of the first thing you should to when the job?
Answer: C
NEW QUESTION 5
This asymmetry cipther is based on factoring the product of two large prime numbers. What cipher is described above?
Answer: C
NEW QUESTION 6
You are logged in as a local admin on a Windows 7 system and you need to launch the Computer Management Console from command line.
Which command would you use?
Answer: C
NEW QUESTION 7
Which of the following is a design pattern based on distinct pieces ofsoftware providing application functionality as services to other applications?
Answer: B
NEW QUESTION 8
The purpose of a is to deny network access to local area networks and other information assets by unauthorized wireless devices.
Answer: D
NEW QUESTION 9
You are performing information gathering for an important penetration test. You have found pdf, doc, and images in your objective. You decide to extract metadata from these files and analyze it.
What tool will help you with the task?
Answer: D
NEW QUESTION 10
The phase will increase the odds of success in later phases of the penetration test. It is also the very first step in Information Gathering, and it will tell you what the“landscape” looks like.
What is the most important phase of ethical hacking in which you need to spend a considerable amount of time?
Answer: C
NEW QUESTION 11
The chance of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from the last backup to the new hard disk. The recovery person earns $10/hour. Calculate theSLE, ARO, and ALE. Assume the EF = 1 (100%).
What is the closest approximate cost of this replacement and recovery operation per year?
Answer: B
NEW QUESTION 12
It is a short-range wireless communication technology intended to replace the cables connecting portables of fixed deviceswhile maintaining high levels of security. It allows mobile phones, computers and other devices to connect and communicate using a short- range wireless connection.
Which of the following terms best matches the definition?
Answer: A
NEW QUESTION 13
Which of the following is not a Bluetooth attack?
Answer: B
NEW QUESTION 14
The network administrator contacts you and tells you that she noticed the temperature on the internal wireless router increases by more than 20% during weekend hours when the office was closed. She asks you to investigate the issue because she is busy dealing with a big conference and she doesn’t have time to perform the task.
What tool can you use to view the network traffic being sent and received by the wireless router?
Answer: B
NEW QUESTION 15
A hacker has successfully infected an internet-facing server, which he will then use to send junk mail, take part incoordinated attacks, or host junk email content.
Which sort of trojan infects this server?
Answer: A
NEW QUESTION 16
An Intrusion Detection System(IDS) has alerted the network administrator to a possibly malicious sequence of packets went to a Web server in the network’s external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file.
What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?
Answer: B
NEW QUESTION 17
PGP, SSL, and IKE are all examples of which type of cryptography?
Answer: :C
NEW QUESTION 18
Which of the following is a low-tech way of gaining unauthorized access to systems?
Answer: B
NEW QUESTION 19
Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?
Answer: C
NEW QUESTION 20
Which of the following isthe greatest threat posed by backups?
Answer: A
NEW QUESTION 21
The configuration allows a wired or wireless network interface controller to pass all trafice it receives to thecentral processing unit (CPU), rather than passing only the frames that the controller is intended to receive.
Which of the following is being described?
Answer: B
NEW QUESTION 22
You are performing a penetration test. You achieved access via a bufferoverflow exploit and you proceed to find interesting data, such as files with usernames and passwords. You find a hidden folder that has the administrator’s bank account password and login information for the administrator’s bitcoin account.
What should you do?
Answer: B
NEW QUESTION 23
......
P.S. Certleader now are offering 100% pass ensure 312-50v9 dumps! All 312-50v9 exam questions have been updated with correct answers: https://www.certleader.com/312-50v9-dumps.html (125 New Questions)