Certbus > EC-COUNCIL > CEH V9 > 312-50V9 > 312-50V9 Online Practice Questions and Answers

312-50V9 Online Practice Questions and Answers

Questions 4

A company recently hired your team of Ethical Hackers to test the security of their network systems. The

company wants to have the attack be as realistic as possible. They did not provide any information besides

the name of their company.

What phase of security testing would your team jump in right away?

A. Scanning

B. Reconnaissance

C. Escalation

D. Enumeration

Browse 614 Q&As
Questions 5

You have initiated an active operating system fingerprinting attempt with nmap against a target system: What operating system is the target host running based on the open ports shown above?

A. Windows XP

B. Windows 98 SE

C. Windows NT4 Server

D. Windows 2000 Server

Browse 614 Q&As
Questions 6

A zone file consists of which of the following Resource Records (RRs)?

A. DNS, NS, AXFR, and MX records

B. DNS, NS, PTR, and MX records

C. SOA, NS, AXFR, and MX records

D. SOA, NS, A, and MX records

Browse 614 Q&As
Questions 7

ViruXine.W32 virus hides their presence by changing the underlying executable code.

This Virus code mutates while keeping the original algorithm intact, the code changes itself each time it

runs, but the function of the code (its semantics) will not change at all.

Here is a section of the Virus code:

What is this technique called?

A. Polymorphic Virus B. Metamorphic Virus

C. Dravidic Virus

D. Stealth Virus

Browse 614 Q&As
Questions 8

How does the Address Resolution Protocol (ARP) work?

A. It sends a request packet to all the network elements, asking for the MAC address from a specific IP.

B. It sends a reply packet to all the network elements, asking for the MAC address from a specific IP.

C. It sends a reply packet for a specific IP, asking for the MAC address.

D. It sends a request packet to all the network elements, asking for the domain name from a specific IP.

Browse 614 Q&As
Questions 9

When you are getting information about a web server, it is very important to know the HTTP Methods (GET, POST, HEAD, PUT, DELETE, TRACE) that are available because there are two critical methods (PUT and DELETE). PUT can upload a file to the server and DELETE can delete a file from the server.

You can detect all these methods (GET, POST, HEAD, PUT, DELETE, TRACE) using NMAP script engine.

What nmap script will help you with this task?

A. http-methods

B. http enum

C. http-headers

D. http-git

Browse 614 Q&As
Questions 10

Which of the following is a command line packet analyzer similar to GUI-based Wireshark?

A. tcpdump

B. nessus

C. etherea

D. Jack the ripper

Browse 614 Q&As
Questions 11

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?

A. ESP transport mode

B. AH permiscuous

C. ESP confidential

D. AH Tunnel mode

Browse 614 Q&As
Questions 12

Craig received a report of all the computers on the network that showed all the missing patches and weak passwords. What type of software generated this report?

A. a port scanner

B. a vulnerability scanner

C. a virus scanner

D. a malware scanner

Browse 614 Q&As
Questions 13

An IT employee got a call from one of our best customers. The caller wanted to know about the company's network infrastructure, systems, and team. New opportunities of integration are in sight for both company and customer. What should this employee do?

A. Since the company's policy is all about Customer Service, he/she will provide information.

B. Disregarding the call, the employee should hang up.

C. The employee should not provide any information without previous management authorization.

D. The employees can not provide any information; but, anyway, he/she will provide the name of the person in charge.

Browse 614 Q&As
Questions 14

What attack is used to crack passwords by using a precomputed table of hashed passwords?

A. Brute Force Attack

B. Hybrid Attack

C. Rainbow Table Attack

D. Dictionary Attack

Browse 614 Q&As
Questions 15

A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted.

Which cryptography attack is the student attempting?

A. Man-in-the-middle attack

B. Brute-force attack

C. Dictionary attack

D. Session hijacking

Browse 614 Q&As
Questions 16

How can telnet be used to fingerprint a web server?

A. telnet webserverAddress 80 HEAD / HTTP/1.0

B. telnet webserverAddress 80 PUT / HTTP/1.0

C. telnet webserverAddress 80 HEAD / HTTP/2.0

D. telnet webserverAddress 80 PUT / HTTP/2.0

Browse 614 Q&As
Questions 17

A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the IT department had a dial-out modem installed. Which security policy must the security analyst check to see if dial-out modems are allowed?

A. Firewall-management policy

B. Acceptable-use policy

C. Remote-access policy

D. Permissive policy

Browse 614 Q&As
Questions 18

A security engineer is attempting to map a company's internal network. The engineer enters in the following NMAP command:

NMAP璶璼 S 璓0 璸 80 ***.***.**.**

What type of scan is this?

A. Quick scan

B. Intense scan

C. Stealth scan

D. Comprehensive scan

Browse 614 Q&As
Exam Code: 312-50V9
Exam Name: Certified Ethical Hacker Exam V9
Last Update: Apr 14, 2024
Questions: 614 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99