Exam Details

  • Exam Code
    :312-50V9
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :614 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V9 Questions & Answers

  • Question 241:

    Which service in a PKI will vouch for the identity of an individual or company?

    A. KDC

    B. CA

    C. CR

    D. CBC

  • Question 242:

    In IPv6 what is the major difference concerning application layer vulnerabilities compared to IPv4?

    A. Implementing IPv4 security in a dual-stack network offers protection from IPv6 attacks too.

    B. Vulnerabilities in the application layer are independent of the network layer. Attacks and mitigation techniques are almost identical.

    C. Due to the extensive security measures built in IPv6, application layer vulnerabilities need not be addresses.

    D. Vulnerabilities in the application layer are greatly different from IPv4.

  • Question 243:

    Which of the following will perform an Xmas scan using NMAP?

    A. nmap -sA 192.168.1.254

    B. nmap -sP 192.168.1.254

    C. nmap -sX 192.168.1.254

    D. nmap -sV 192.168.1.254

  • Question 244:

    As an Ethical Hacker you are capturing traffic from your customer network with Wireshark and you need to find and verify just SMTP traffic. What command in Wireshark will help you to find this kind of traffic?

    A. request smtp 25

    B. tcp.port eq 25

    C. smtp port

    D. tcp.contains port 25

  • Question 245:

    In an internal security audit, the white hat hacker gains control over a user account and attempts to acquire access to another account's confidential files and information. How can he achieve this?

    A. Port Scanning

    B. Hacking Active Directory

    C. Privilege Escalation

    D. Shoulder-Surfing

  • Question 246:

    Bob received this text message on his mobile phone: ""Hello, this is Scott Smelby from the Yahoo Bank. Kindly contact me for a vital transaction on: [email protected]"". Which statement below is true?

    A. This is probably a legitimate message as it comes from a respectable organization.

    B. Bob should write to [email protected] to verify the identity of Scott.

    C. This is a scam as everybody can get a @yahoo address, not the Yahoo customer service employees.

    D. This is a scam because Bob does not know Scott.

  • Question 247:

    The security administrator of ABC needs to permit Internet traffic in the host 10.0.0.2 and UDP traffic in the host 10.0.0.3. Also he needs to permit all FTP traffic to the rest of the network and deny all other traffic. After he applied his ACL configuration in the router nobody can access to the ftp and the permitted hosts cannot access to the Internet. According to the next configuration what is happening in the network?

    A. The ACL 110 needs to be changed to port 80

    B. The ACL for FTP must be before the ACL 110

    C. The first ACL is denying all TCP traffic and the other ACLs are being ignored by the router

    D. The ACL 104 needs to be first because is UDP

  • Question 248:

    Which of the following programming languages is most susceptible to buffer overflow attacks, due to its lack of a built-in-bounds checking mechanism?

    Output: Segmentation fault

    A. C#

    B. Python

    C. Java

    D. C++

  • Question 249:

    What is the difference between the AES and RSA algorithms?

    A. Both are asymmetric algorithms, but RSA uses 1024-bit keys.

    B. RSA is asymmetric, which is used to create a public/private key pair; AES is symmetric, which is used to encrypt data.

    C. Both are symmetric algorithms, but AES uses 256-bit keys.

    D. AES is asymmetric, which is used to create a public/private key pair; RSA is symmetric, which is used to encrypt data.

  • Question 250:

    Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?

    A. Scalability

    B. Speed

    C. Key distribution

    D. Security

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.