EC-Council Certified Ethical Hacker Exam V9 312-50V9 Exam Questions in PDF

Free EC-Council 312-50V9 Dumps Questions (page: 2)

You are performing information gathering for an important penetration test. You have found pdf, doc, and images in your objective. You decide to extract metadata from these files and analyze it.
What tool will help you with the task?

  1. Armitage
  2. Dimitry
  3. cdpsnarf
  4. Metagoofil

Answer(s): D



A Regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server.
Based on this information, what should be one of your key recommendations to the bank?

  1. Move the financial data to another server on the same IP subnet
  2. Place a front-end web server in a demilitarized zone that only handles external web traffic
  3. Issue new certificates to the web servers from the root certificate authority
  4. Require all employees to change their passwords immediately

Answer(s): A



Under the "Post-attach Phase and Activities, " it is the responsibility of the tester to restore the system to a pre-test state.
Which of the following activities should not be included in this phase?

I). Removing all files uploaded on the system
II). Cleaning all registry entries
III). Mapping of network state
IV). Removing all tools and maintaining backdoor for reporting

  1. III
  2. IV
  3. III and IV
  4. All should be included.

Answer(s): A



Which of the following is a low-tech way of gaining unauthorized access to systems?

  1. Sniffing
  2. Social engineering
  3. Scanning
  4. Eavesdropping

Answer(s): B



Which of the following statements regarding ethical hacking is incorrect?

  1. Testing should be remotely performed offsite.
  2. Ethical hackers should never use tools that have potential of exploiting vulnerabilities in the
    organizations IT system.
  3. Ethical hacking should not involve writing to or modifying the target systems.
  4. An organization should use ethical hackers who do not sell hardware/software or other consulting services.

Answer(s): B



Session splicing is an IDS evasiontechnique in which an attacker delivers data in multiple, smallsized packets to the target computer, making it very difficult for an IDS to detect the attack signatures.
Which tool can used to perform session splicing attacks?

  1. Hydra
  2. Burp
  3. Whisker
  4. Tcpsplice

Answer(s): C



You have compromised a server on a network and successfully open a shell. You aimed to identify all operating systems running on the network. However, as you attemptto fingerprint all machines in the machines in the network using the nmap syntax below, it is not going through.
invictus@victim_server:~$nmap ­T4 ­O 10.10.0.0/24
TCP/IP fingerprinting (for OS scan) xxxxxxx xxxxxx xxxxxxxxxx.
QUITTING!
What seems to be wrong?

  1. The outgoing TCP/IP fingerprinting is blocked by the host firewall.
  2. This is a common behavior for a corrupted nmap application.
  3. OS Scan requires root privileged.
  4. The nmap syntax is wrong.

Answer(s): D



After trying multiple exploits, you've gained root access to a Centos 6 answer. To ensure you maintain access. What would you do first?

  1. Disable IPTables
  2. Create User Account
  3. Downloadand Install Netcat
  4. Disable Key Services

Answer(s): C



Share your comments for EC-Council 312-50V9 exam with other users:

S
sheik
10/14/2023 11:37:00 AM

@aarun , thanks for the information. it would be great help if you share your email

R
Random user
12/11/2023 1:34:00 AM

1z0-1078-23 need this dumps

L
labuschanka
11/16/2023 6:06:00 PM

i gave the microsoft azure az-500 tests and prepared from this site as it has latest mock tests available which helped me evaluate my performance and score 919/1000

M
Marianne
10/22/2023 11:57:00 PM

i cannot see the button to go to the questions

S
sushant
6/28/2023 4:52:00 AM

good questions

A
A\MAM
6/27/2023 5:17:00 PM

q-6 ans-b correct. https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-cli-quick-start/use-the-cli/commit-configuration-changes

U
unanimous
12/15/2023 6:38:00 AM

very nice very nice

A
akminocha
9/28/2023 10:36:00 AM

please help us with 1z0-1107-2 dumps

J
Jefi
9/4/2023 8:15:00 AM

please upload the practice questions

T
Thembelani
5/30/2023 2:45:00 AM

need this dumps

A
Abduraimov
4/19/2023 12:43:00 AM

preparing for this exam is overwhelming. you cannot pass without the help of these exam dumps.

P
Puneeth
10/5/2023 2:06:00 AM

new to this site but i feel it is good

A
Ashok Kumar
1/2/2024 6:53:00 AM

the correct answer to q8 is b. explanation since the mule app has a dependency, it is necessary to include project modules and dependencies to make sure the app will run successfully on the runtime on any other machine. source code of the component that the mule app is dependent of does not need to be included in the exported jar file, because the source code is not being used while executing an app. compiled code is being used instead.

M
Merry
7/30/2023 6:57:00 AM

good questions

V
VoiceofMidnight
12/17/2023 4:07:00 PM

Delayed the exam until December 29th.

U
Umar Ali
8/29/2023 2:59:00 PM

A and D are True

V
vel
8/28/2023 9:17:09 AM

good one with explanation

G
Gurdeep
1/18/2024 4:00:15 PM

This is one of the most useful study guides I have ever used.

AI Tutor 👋 I’m here to help!