Act now and download your EC-Council 312-50v9 test today! Do not waste time for the worthless EC-Council 312-50v9 tutorials. Download Avant-garde EC-Council EC-Council Certified Ethical Hacker v9 exam with real questions and answers and begin to learn EC-Council 312-50v9 with a classic professional.

Q1. It is a short-range wireless communication technology intended to replace the cables connecting portables of fixed deviceswhile maintaining high levels of security. It allows mobile phones, computers and other devices to connect and communicate using a short- range wireless connection.

Which of the following terms best matches the definition?

A. Bluetooth

B. Radio-Frequency Identification

C. WLAN

D. InfraRed

Answer: A


Q2. During a security audit of IT processes, an IS auditor found that there was no documented security procedures. What should the IS auditor do?

A. Terminate the audit.

B. Identify and evaluate existing practices.

C. Create a procedures document

D. Conduct compliance testing

Answer: B


Q3. Perspective clients wantto see sample reports from previous penetration tests. What should you do next?

A. Share full reports, not redacted.

B. Share full reports, with redacted.

C. Decline but, provide references.

D. Share reports, after NDA is signed.

Answer: B


Q4. What is the process of logging, recording, and resolving events that take place in an organization?

A. Metrics

B. Security Policy

C. Internal Procedure

D. Incident Management Process

Answer: D


Q5. You have compromised a server on a network and successfully open a shell. You aimed to identify all operating systems running on the network. However, as you attemptto fingerprint all machines in the machines in the network using the nmap syntax below, it is not going through.

invictus@victim_server:~$nmap –T4 –O 10.10.0.0/24

TCP/IP fingerprinting (for OS scan) xxxxxxx xxxxxx xxxxxxxxxx. QUITTING!

What seems to be wrong?

A. The outgoing TCP/IP fingerprinting is blocked by the host firewall.

B. This is a common behavior for a corrupted nmap application.

C. OS Scan requires root privileged.

D. The nmap syntax is wrong.

Answer: D


Q6. You have compromised a server and successfully gained a root access. You want to pivot and pass traffic undetected over the network and evade any possible Intrusion Detection System.

What is the best approach?

A. Install and use Telnet to encrypt all outgoing traffic from this server.

B. Install Cryptcat and encrypt outgoing packets from this server

C. Use Alternate Data Streams to hide the outgoing packets from this server.

D. Use HTTP so that all traffic can be routed via a browser, thus evading the internal Intrusion Detection Systems.

Answer: A


Q7. A company’s security states that all web browsers must automatically delete their HTTP browser cookies upon terminating. What sort of security breach is this policy attempting to mitigate?

A. Attempts by attackers to determine the user's Web browser usage patterns, including when sites were visited and for how long.

B. Attempts by attackers to access passwords stored on the user's computer without the user's knowledge.

C. Attempts by attackers to access Web sites that trust the Web browser user by stealing the user's authentication credentials.

D. Attempts by attacks to access the user and password information stores in the company's SQL database.

Answer: C


Q8. You have successfully compromised a machine on the network and found a server that is alive on the same network. You tried to ping but you didn’t get any response back.

What is happening?

A. TCP/IP doesn’t support ICMP.

B. ICMP could be disabled on the target server.

C. The ARP is disabled on the target server.

D. You need to run the ping command with root privileges.

Answer: A


Q9. Which of the following describes the characteristics of a Boot Sector Virus?

A. Overwrites the original MBR and only executes the new virus code

B. Modifies directory table entries so that directory entries point to the virus code instead of the actual program

C. Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR

D. Moves the MBR to another location on the RAM and copies itself to the original location of the MBR

Answer: C


Q10. When you return to your desk after a lunch break, you notice a strange email in your inbox. The senders is someone you did business with recently but the subject line has strange characters in it.

What should you do?

A. Forward the message to your company’s security response team and permanently delete the message from your computer.

B. Delete the email and pretend nothing happened.

C. Forward the message to your supervisor andask for her opinion on how to handle the situation.

D. Reply to the sender and ask them for more information about the message contents.

Answer: A