Exam Details

  • Exam Code
    :312-50V9
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :614 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V9 Questions & Answers

  • Question 171:

    What is the main reason the use of a stored biometric is vulnerable to an attack?

    A. The digital representation of the biometric might not be unique, even if the physical characteristic is unique.

    B. Authentication using a stored biometric compares a copy to a copy instead of the original to a copy.

    C. A stored biometric is no longer "something you are" and instead becomes "something you have".

    D. A stored biometric can be stolen and used by an attacker to impersonate the individual identified by the biometric.

  • Question 172:

    Which type of scan is used on the eye to measure the layer of blood vessels?

    A. Facial recognition scan

    B. Retinal scan

    C. Iris scan

    D. Signature kinetics scan

  • Question 173:

    A security consultant is trying to bid on a large contract that involves penetration testing and reporting. The company accepting bids wants proof of work so the consultant prints out several audits that have been performed. Which of the following is likely to occur as a result?

    A. The consultant will ask for money on the bid because of great work.

    B. The consultant may expose vulnerabilities of other companies.

    C. The company accepting bids will want the same type of format of testing.

    D. The company accepting bids will hire the consultant because of the great work performed.

  • Question 174:

    Which of the following processes evaluates the adherence of an organization to its stated security policy?

    A. Vulnerability assessment

    B. Penetration testing

    C. Risk assessment D. Security auditing

  • Question 175:

    When creating a security program, which approach would be used if senior management is supporting and enforcing the security policy?

    A. A bottom-up approach

    B. A top-down approach

    C. A senior creation approach

    D. An IT assurance approach

  • Question 176:

    A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the IT department had a dial-out modem installed. Which security policy must the security analyst check to see if dial-out modems are allowed?

    A. Firewall-management policy

    B. Acceptable-use policy

    C. Remote-access policy

    D. Permissive policy

  • Question 177:

    Which of the following scanning tools is specifically designed to find potential exploits in Microsoft Windows products?

    A. Microsoft Security Baseline Analyzer

    B. Retina

    C. Core Impact

    D. Microsoft Baseline Security Analyzer

  • Question 178:

    Which of the following resources does NMAP need to be used as a basic vulnerability scanner covering several vectors like SMB, HTTP and FTP?

    A. Metasploit scripting engine

    B. Nessus scripting engine

    C. NMAP scripting engine

    D. SAINT scripting engine

  • Question 179:

    A security consultant decides to use multiple layers of anti-virus defense, such as end user desktop anti-virus and E-mail gateway. This approach can be used to mitigate which kind of attack?

    A. Forensic attack

    B. ARP spoofing attack

    C. Social engineering attack

    D. Scanning attack

  • Question 180:

    While performing data validation of web content, a security technician is required to restrict malicious input. Which of the following processes is an efficient way of restricting malicious input?

    A. Validate web content input for query strings.

    B. Validate web content input with scanning tools.

    C. Validate web content input for type, length, and range.

    D. Validate web content input for extraneous queries.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.