EC-Council Certified Ethical Hacker Exam V9 312-50V9 Exam Questions in PDF

Free EC-Council 312-50V9 Dumps Questions (page: 1)

An Intrusion Detection System(IDS) has alerted the network administrator to a possibly malicious sequence of packets went to a Web server in the network's external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file.
What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?

  1. Protocol analyzer
  2. Intrusion Prevention System (IPS)
  3. Vulnerability scanner
  4. Network sniffer

Answer(s): B



PGP, SSL, and IKE are all examples of which type of cryptography?

  1. Hash Algorithm
  2. Secret Key
  3. Public Key
  4. Digest

Answer(s): C



It isan entity or event with the potential to adversely impact a system through unauthorized access destruction disclosures denial of service or modification of data.
Which of the following terms best matches this definition?

  1. Threat
  2. Attack
  3. Risk
  4. Vulnerability

Answer(s): A



During a blackbox pen test you attempt to pass IRC traffic over post 80/TCP from a compromised web enabled host. The traffic gets blocked; however outbound HTTP traffic is unimpeded.
What type of firewall is inspecting outbound traffic?

  1. Circuit
  2. Packet Filtering
  3. Application
  4. Stateful

Answer(s): C



Which of the following is not a Bluetooth attack?

  1. Bluejacking
  2. Bluedriving
  3. Bluesnarfing
  4. Bluesmaking

Answer(s): B



You've gained physical access to a Windows 2008 R2 server which has as accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your tool kit you have an Ubuntu 9.10 Linux LiveCD.Which Linux tool has the ability to change any user's password or to activate disabled Windows Accounts?

  1. John the Ripper
  2. CHNTPW
  3. Cain & Abel
  4. SET

Answer(s): A



A company's Web development team has become aware ofa certain type of security vulnerability in their Web software. To mitigate the possibility of this vulnerability being exploited, the team wants to modify the software requirements to disallow users from entering HTML as input into their Web application.
What kind of web application vulnerability likely exists in their software?

  1. Web site defacement vulnerability
  2. SQL injection vulnerability
  3. Cross-site Scripting vulnerability
  4. Cross-site Request Forgery vulnerability

Answer(s): C



The purpose of a ____________ is to deny network access to local area networks and other information assets by unauthorized wireless devices.

  1. Wireless Access Point
  2. Wireless Analyzer
  3. Wireless Access Control list
  4. Wireless Intrusion Prevention System

Answer(s): D



Viewing page 1 of 17

Share your comments for EC-Council 312-50V9 exam with other users:

B
Bhagiii
11/4/2023 7:04:00 AM

well explained.

R
Rahul
8/8/2023 9:40:00 PM

i need the pdf, please.

C
CW
7/11/2023 2:51:00 PM

a good source for exam preparation

A
Anchal
10/23/2023 4:01:00 PM

nice questions

J
J Nunes
9/29/2023 8:19:00 AM

i need ielts general training audio guide questions

A
Ananya
9/14/2023 5:16:00 AM

please make this content available

S
Swathi
6/4/2023 2:18:00 PM

content is good

L
Leo
7/29/2023 8:45:00 AM

latest dumps please

L
Laolu
2/15/2023 11:04:00 PM

aside from pdf the test engine software is helpful. the interface is user-friendly and intuitive, making it easy to navigate and find the questions.

Z
Zaynik
9/17/2023 5:36:00 AM

questions and options are correct, but the answers are wrong sometimes. so please check twice or refer some other platform for the right answer

M
Massam
6/11/2022 5:55:00 PM

90% of questions was there but i failed the exam, i marked the answers as per the guide but looks like they are not accurate , if not i would have passed the exam given that i saw about 45 of 50 questions from dump

A
Anonymous
12/27/2023 12:47:00 AM

answer to this question "what administrative safeguards should be implemented to protect the collected data while in use by manasa and her product management team? " it should be (c) for the following reasons: this administrative safeguard involves controlling access to collected data by ensuring that only individuals who need the data for their job responsibilities have access to it. this helps minimize the risk of unauthorized access and potential misuse of sensitive information. while other options such as (a) documenting data flows and (b) conducting a privacy impact assessment (pia) are important steps in data protection, implementing a "need to know" access policy directly addresses the issue of protecting data while in use by limiting access to those who require it for legitimate purposes. (d) is not directly related to safeguarding data during use; it focuses on data transfers and location.

J
Japles
5/23/2023 9:46:00 PM

password lockout being the correct answer for question 37 does not make sense. it should be geofencing.

F
Faritha
8/10/2023 6:00:00 PM

for question 4, the righr answer is :recover automatically from failures

A
Anonymous
9/14/2023 4:27:00 AM

question number 4s answer is 3, option c. i

P
p das
12/7/2023 11:41:00 PM

very good questions

A
Anna
1/5/2024 1:12:00 AM

i am confused about the answers to the questions. are the answers correct?

B
Bhavya
9/13/2023 10:15:00 AM

very usefull

R
Rahul Kumar
8/31/2023 12:30:00 PM

need certification.

D
Diran Ole
9/17/2023 5:15:00 PM

great exam prep

V
Venkata Subbarao Bandaru
6/24/2023 8:45:00 AM

i require dump

D
D
7/15/2023 1:38:00 AM

good morning, could you please upload this exam again,

A
Ann
9/15/2023 5:39:00 PM

hi can you please upload the dumps for sap contingent module. thanks

S
Sridhar
1/16/2024 9:19:00 PM

good questions

S
Summer
10/4/2023 9:57:00 PM

looking forward to the real exam

V
vv
12/2/2023 2:45:00 PM

good ones for exam preparation

D
Danny Zas
9/15/2023 4:45:00 AM

this is a good experience

S
SM 1211
10/12/2023 10:06:00 PM

hi everyone

A
A
10/2/2023 6:08:00 PM

waiting for the dump. please upload.

A
Anonymous
7/16/2023 11:05:00 AM

upload cks exam questions

J
Johan
12/13/2023 8:16:00 AM

awesome training material

P
PC
7/28/2023 3:49:00 PM

where is dump

Y
YoloStar Yoloing
10/22/2023 9:58:00 PM

q. 289 - the correct answer should be b not d, since the question asks for the most secure way to provide access to a s3 bucket (a single one), and by principle of the least privilege you should not be giving access to all buckets.

Z
Zelalem Nega
5/14/2023 12:45:00 PM

please i need if possible h12-831,

AI Tutor 👋 I’m here to help!