Exam Details

  • Exam Code
    :312-50V9
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :614 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V9 Questions & Answers

  • Question 91:

    What statement is true regarding LM hashes?

    A. LM hashes consist in 48 hexadecimal characters.

    B. LM hashes are based on AES128 cryptographic standard.

    C. Uppercase characters in the password are converted to lowercase.

    D. LM hashes are not generated when the password length exceeds 15 characters.

  • Question 92:

    After gaining access to the password hashes used to protect access to a web based application, knowledge of which cryptographic algorithms would be useful to gain access to the application?

    A. SHA1

    B. Diffie-Helman

    C. RSA

    D. AES

  • Question 93:

    Which of the following is an example of two factor authentication?

    A. PIN Number and Birth Date

    B. Username and Password

    C. Digital Certificate and Hardware Token

    D. Fingerprint and Smartcard ID

  • Question 94:

    Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process. Which of the following is the correct bit size of the Diffie-Hellman (DH) group 5?

    A. 768 bit key

    B. 1025 bit key

    C. 1536 bit key

    D. 2048 bit key

  • Question 95:

    Which tool would be used to collect wireless packet data?

    A. NetStumbler

    B. John the Ripper

    C. Nessus

    D. Netcat

  • Question 96:

    What is the correct PCAP filter to capture all TCP traffic going to or from host 192.168.0.125 on port 25?

    A. tcp.src == 25 and ip.host == 192.168.0.125

    B. host 192.168.0.125:25

    C. port 25 and host 192.168.0.125

    D. tcp.port == 25 and ip.host == 192.168.0.125

  • Question 97:

    Which of the following problems can be solved by using Wireshark?

    A. Tracking version changes of source code

    B. Checking creation dates on all webpages on a server

    C. Resetting the administrator password on multiple systems

    D. Troubleshooting communication resets between two systems

  • Question 98:

    Which of the following is a hashing algorithm?

    A. MD5

    B. PGP

    C. DES

    D. ROT13

  • Question 99:

    Smart cards use which protocol to transfer the certificate in a secure manner?

    A. Extensible Authentication Protocol (EAP)

    B. Point to Point Protocol (PPP)

    C. Point to Point Tunneling Protocol (PPTP)

    D. Layer 2 Tunneling Protocol (L2TP)

  • Question 100:

    Which of the following programming languages is most vulnerable to buffer overflow attacks?

    A. Perl

    B. C++

    C. Python

    D. Java

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.