Leads4pass > EC-COUNCIL > CEH V9 > 312-50V9 > 312-50V9 Online Practice Questions and Answers

312-50V9 Online Practice Questions and Answers

Questions 4

While reviewing the result of scanning run against a target network you come across the following:

Which among the following can be used to get this output?

A. A Bo2k system query.

B. nmap protocol scan

C. A sniffer

D. An SNMP walk

Buy Now
Questions 5

You went to great lengths to install all the necessary technologies to prevent hacking attacks, such as expensive firewalls, antivirus software, anti-spam systems and intrusion detection/prevention tools in your company's network. You have configured the most secure policies and tightened every device on your

network. You are confident that hackers will never be able to gain access to your network with complex

security system in place.

Your peer, Peter Smith who works at the same department disagrees with you.

He says even the best network security technologies cannot prevent hackers gaining access to the

network because of presence of "weakest link" in the security chain.

What is Peter Smith talking about?

A. Untrained staff or ignorant computer users who inadvertently become the weakest link in your security chain

B. "zero-day" exploits are the weakest link in the security chain since the IDS will not be able to detect these attacks

C. "Polymorphic viruses" are the weakest link in the security chain since the Anti-Virus scanners will not be able to detect these attacks

D. Continuous Spam e-mails cannot be blocked by your security system since spammers use different techniques to bypass the filters in your gateway

Buy Now
Questions 6

You have compromised a server on a network and successfully opened a shell. You aimed to identify all operating systems running on the network. However, as you attempt to fingerprint all machines in the network using the nmap syntax below, it is not going through.

What seems to be wrong?

A. OS Scan requires root privileges.

B. The nmap syntax is wrong.

C. This is a common behavior for a corrupted nmap application.

D. The outgoing TCP/IP fingerprinting is blocked by the host firewall.

Buy Now
Questions 7

Jesse receives an email with an attachment labeled "Court_Notice_21206.zip". Inside the zip file is a file named "Court_Notice_21206.docx.exe" disguised as a word document. Upon execution, a window appears stating, "This word document is corrupt." In the background, the file copies itself to Jesse APPDATA\local directory and begins to beacon to a C2 server to download additional malicious binaries.

What type of malware has Jesse encountered?

A. Trojan

B. Worm

C. Macro Virus

D. Key-Logger

Buy Now
Questions 8

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?

A. ESP transport mode

B. AH permiscuous

C. ESP confidential

D. AH Tunnel mode

Buy Now
Questions 9

A new wireless client is configured to join a 802.11 network. This client uses the same hardware and software as many of the other clients on the network. The client can see the network, but cannot connect. A wireless packet sniffer shows that the Wireless Access Point (WAP) is not responding to the association requests being sent by the wireless client.

What is a possible source of this problem?

A. The WAP does not recognize the client's MAC address

B. The client cannot see the SSID of the wireless network

C. Client is configured for the wrong channel

D. The wireless client is not configured to use DHCP

Buy Now
Questions 10

What is the way to decide how a packet will move from an untrusted outside host to a protected inside that is behind a firewall, which permits the hacker to determine which ports are open and if the packets can pass through the packet- filtering of the firewall.

A. Firewalking

B. Session hijacking

C. Network sniffing

D. Man-in-the-middle attack

Buy Now
Questions 11

What is correct about digital signatures?

A. A digital signature cannot be moved from one signed document to another because it is the hash of the original document encrypted with the private key of the signing party.

B. Digital signatures may be used in different documents of the same type.

C. A digital signature cannot be moved from one signed document to another because it is a plain hash of the document content.

D. Digital signatures are issued once for each user and can be used everywhere until they expire.

Buy Now
Questions 12

Which of the following is a hashing algorithm?

A. MD5

B. PGP

C. DES

D. ROT13

Buy Now
Questions 13

Which of the following is an example of two factor authentication?

A. PIN Number and Birth Date

B. Username and Password

C. Digital Certificate and Hardware Token

D. Fingerprint and Smartcard ID

Buy Now
Exam Code: 312-50V9
Exam Name: Certified Ethical Hacker Exam V9
Last Update: Dec 10, 2024
Questions: 614
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99