Exam Details

  • Exam Code
    :312-50V9
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :614 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V9 Questions & Answers

  • Question 271:

    Jimmy is standing outside a secure entrance to a facility. He is pretending to have a tense conversation on his cell phone as an authorized employee badges in. Jimmy, while still on the phone, grabs the door as it begins to close.

    What just happened?

    A. Phishing

    B. Whaling

    C. Tailgating

    D. Masquerading

  • Question 272:

    You're doing an internal security audit and you want to find out what ports are open on all the servers. What is the best way to find out?

    A. Scan servers with Nmap

    B. Physically go to each server

    C. Scan servers with MBSA

    D. Telent to every port on each server

  • Question 273:

    Emil uses nmap to scan two hosts using this command.

    nmap -sS -T4 -O 192.168.99.1 192.168.99.7

    He receives this output: What is his conclusion?

    A. Host 192.168.99.7 is an iPad.

    B. He performed a SYN scan and OS scan on hosts 192.168.99.1 and 192.168.99.7.

    C. Host 192.168.99.1 is the host that he launched the scan from.

    D. Host 192.168.99.7 is down.

  • Question 274:

    What is the correct process for the TCP three-way handshake connection establishment and connection termination?

    A. Connection Establishment: FIN, ACK-FIN, ACK Connection Termination: SYN, SYN-ACK, ACK

    B. Connection Establishment: SYN, SYN-ACK, ACK Connection Termination: ACK, ACK-SYN, SYN

    C. Connection Establishment: ACK, ACK-SYN, SYN Connection Termination: FIN, ACK-FIN, ACK

    D. Connection Establishment: SYN, SYN-ACK, ACK Connection Termination: FIN, ACK-FIN, ACK

  • Question 275:

    You are an Ethical Hacker who is auditing the ABC company. When you verify the NOC one of the machines has 2 connections, one wired and the other wireless. When you verify the configuration of this Windows system you find two static routes.

    route add 10.0.0.0 mask 255.0.0.0 10.0.0.1 route add 0.0.0.0 mask 255.0.0.0 199.168.0.1

    What is the main purpose of those static routes?

    A. Both static routes indicate that the traffic is external with different gateway.

    B. The first static route indicates that the internal traffic will use an external gateway and the second static route indicates that the traffic will be rerouted.

    C. Both static routes indicate that the traffic is internal with different gateway.

    D. The first static route indicates that the internal addresses are using the internal gateway and the second static route indicates that all the traffic that is not internal must go to an external gateway.

  • Question 276:

    In many states sending spam is illegal. Thus, the spammers have techniques to try and ensure that no one knows they sent the spam out to thousands of users at a time. Which of the following best describes what spammers use to hide the origin of these types of e-mails?

    A. A blacklist of companies that have their mail server relays configured to allow traffic only to their specific domain name.

    B. Mail relaying, which is a technique of bouncing e-mail from internal to external mails servers continuously.

    C. A blacklist of companies that have their mail server relays configured to be wide open.

    D. Tools that will reconfigure a mail server's relay component to send the e-mail back to the spammers occasionally.

  • Question 277:

    Due to a slow down of normal network operations, IT department decided to monitor internet traffic for all of the employees. From a legal stand point, what would be troublesome to take this kind of measure?

    A. All of the employees would stop normal work activities

    B. IT department would be telling employees who the boss is

    C. Not informing the employees that they are going to be monitored could be an invasion of privacy.

    D. The network could still experience traffic slow down.

  • Question 278:

    When purchasing a biometric system, one of the considerations that should be reviewed is the processing speed. Which of the following best describes what it is meant by processing?

    A. The amount of time it takes to convert biometric data into a template on a smart card.

    B. The amount of time and resources that are necessary to maintain a biometric system.

    C. The amount of time it takes to be either accepted or rejected form when an individual provides Identification and authentication information.

    D. How long it takes to setup individual user accounts.

  • Question 279:

    A large mobile telephony and data network operator has a data that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems. What is the best security policy concerning this setup?

    A. Network elements must be hardened with user ids and strong passwords. Regular security tests and audits should be performed.

    B. As long as the physical access to the network elements is restricted, there is no need for additional measures.

    C. There is no need for specific security measures on the network elements as long as firewalls and IPS systems exist.

    D. The operator knows that attacks and down time are inevitable and should have a backup site.

  • Question 280:

    An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?

    A. He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.

    B. He will activate OSPF on the spoofed root bridge.

    C. He will repeat the same attack against all L2 switches of the network.

    D. He will repeat this action so that it escalates to a DoS attack.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.