EC-Council 312-50v9
Get real exam questions for 312-50v9 EC-Council Certified Ethical Hacker v9. 100% Free.
312-50v9 Premium VCE File
Learn More
100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours
Q1. A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing inconcluding the Operating System (OS) version installed. Considering the NMAP result below, which of the follow is likely to be installed on the target machine by the OS? Starting NMAP 5.21 at 2011-03-15 11:06 NMAP scan reportfor 172.16.40.65 Host is up (1.00s latency)
Q1. Which of the following isthe greatest threat posed by backups?A. An un-encrypted backup can be misplaced or stolenB. A back is incomplete because no verification was performed.C. A backup is the source of Malware or illicit information.D. A backup is unavailable duringdisaster recovery.View AnswerAnswer: AQ2. What term describes the amount of risk that remains after the vulnerabilities are
Q1. What is the process of logging, recording, and resolving events that take place in an organization?A. MetricsB. Security PolicyC. Internal ProcedureD. Incident Management ProcessView AnswerAnswer: DQ2. Which of the following parameters describe LM Hash: I – The maximum password length is 14 characters.II – There are no distinctions between uppercase and lowercase.III – It’s a simple
Q1. You are attempting to man-in-the-middle a session. Which protocol will allow you to guess a sequence number?A. ICMPB. TCPC. UDPD. UPXView AnswerAnswer: BQ2. env x= ‘(){ :;};echo exploit ‘ bash –c ‘cat/etc/passwdWhat is the Shellshock bash vulnerability attempting to do on an vulnerable Linux host?A. Add new user to the passwd fileB. Display passwd contents to promptC. Change all pas
Q1. Which of the following is a design pattern based on distinct pieces ofsoftware providing application functionality as services to other applications?A. Lean CodingB. Service Oriented ArchitectureC. Object Oriented ArchitectureD. Agile ProcessView AnswerAnswer: BQ2. What does a firewall check to prevent particularports and applications from getting packets into an organizations?A. Transport
Q1. Which of the followingtypes of firewalls ensures that the packets are part of the established session?A. Switch-level firewallB. Stateful inspection firewallC. Application-level firewallD. Circuit-level firewallView AnswerAnswer: BQ2. A common cryptographically tool is the use of XOR. XOR the following binary value: 1011000100111010A. 10001011B. 10011101C. 11011000D. 10111100View AnswerAnswe
Q1. While using your bank’s online servicing you notice the following stringin the URL bar: “http://www.MyPersonalBank/Account?Id=368940911028389&Damount=10980&Camount=21”You observe that if you modify the Damount & Camount values and submit the request, that data on the web page reflect the changes.What type of vulnerability is present on this site?A. SQL injectionB. XSS Reflec