Actualtests offers free demo for 312-50v9 exam. "EC-Council Certified Ethical Hacker v9", also known as 312-50v9 exam, is a EC-Council Certification. This set of posts, Passing the EC-Council 312-50v9 exam, will help you answer those questions. The 312-50v9 Questions & Answers covers all the knowledge points of the real exam. 100% real EC-Council 312-50v9 exams and revised by experts!

Q21. You are performing information gathering for an important penetration test. You have found pdf, doc, and images in your objective. You decide to extract metadata from these files and analyze it.

What tool will help you with the task?

A. Armitage

B. Dimitry

C. cdpsnarf

D. Metagoofil

Answer: D

Q22. A common cryptographically tool is the use of XOR. XOR the following binary value: 10110001


A. 10001011

B. 10011101

C. 11011000

D. 10111100

Answer: A

Q23. During a blackbox pen test you attempt to pass IRC traffic over post 80/TCP from a compromised web enabled host. The traffic gets blocked; however outbound HTTP traffic is unimpeded.

What type of firewall is inspecting outbound traffic?

A. Circuit

B. Packet Filtering

C. Application

D. Stateful

Answer: C

Q24. How does the Address Resolution Protocol (ARP) work?

A. It sends a reply packet for a specific IP, asking for the MAC address.

B. It sends a reply packet to all the network elements, asking for the MAC address from a specific IP.

C. It sends a request packet to all the network elements, asking for the domainname from a specific IP.

D. It sends a request packet to all the network elements, asking for the MAC address from a specific IP.

Answer: D

Q25. Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?

A. Kismet

B. Netstumbler

C. Abel

D. Nessus

Answer: A

Q26. Risk = Threats x Vulnerabilities is referred to as the:

A. Threat assessment

B. Disaster recovery formula

C. BIA equation

D. Risk equation

Answer: D

Q27. Jesse receives an email with an attachment labeled “”. Inside the zip file is a file named “Court_Notice_21206.docx.exe” disguised as a word document.Upon execution, a windows appears stating, “This word document is corrupt.” In the background, the file copies itself to Jesse APPDATAlocal directory and begins to beacon to a C2 server to download additional malicious binaries. What type of malware has Jesse encountered?

A. Trojan

B. Worm

C. Key-Logger

D. Micro Virus

Answer: A

Q28. Which of the following is a command line packet analyzer similar to GUI-based Wireshark?

A. Jack the ripper

B. nessus

C. tcpdump

D. ethereal

Answer: C

Q29. PGP, SSL, and IKE are all examples of which type of cryptography?

A. Hash Algorithm

B. Secret Key

C. Public Key

D. Digest

Answer:: C

Q30. An attacker gains access to a Web server’s database and display the contents of the table that holds all of the names, passwords, and other user information. The attacker did this by entering information into the Web site's user login page that the software's designers did not expect to be entered. This is an example of what kind of software design problem?

A. Insufficient security management

B. Insufficient database hardening

C. Insufficient exception handling

D. Insufficient input validation

Answer: D