Exam Details

  • Exam Code
    :312-50V9
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :614 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V9 Questions & Answers

  • Question 281:

    Websites and web portals that provide web services commonly use the Simple Object Access Protocol SOAP. Which of the following is an incorrect definition or characteristics in the protocol?

    A. Based on XML

    B. Provides a structured model for messaging

    C. Exchanges data between web services

    D. Only compatible with the application protocol HTTP

  • Question 282:

    A penetration test was done at a company. After the test, a report was written and given to the company's IT authorities. A section from the report is shown below:

    Access List should be written between VLANs.

    Port security should be enabled for the intranet.

    A security solution which filters data packets should be set between intranet (LAN) and DMZ.

    A WAF should be used in front of the web applications.

    According to the section from the report, which of the following choice is true?

    A. MAC Spoof attacks cannot be performed.

    B. Possibility of SQL Injection attack is eliminated.

    C. A stateful firewall can be used between intranet (LAN) and DMZ.

    D. There is access control policy between VLANs.

  • Question 283:

    In order to have an anonymous Internet surf, which of the following is best choice?

    A. Use SSL sites when entering personal information

    B. Use Tor network with multi-node

    C. Use shared WiFi

    D. Use public VPN

  • Question 284:

    Attempting an injection attack on a web server based on responses to True/False questions is called which of the following?

    A. Blind SQLi

    B. DMS-specific SQLi

    C. Classic SQLi

    D. Compound SQLi

  • Question 285:

    Rebecca commonly sees an error on her Windows system that states that a Data Execution Prevention (DEP) error has taken place. Which of the following is most likely taking place?

    A. A race condition is being exploited, and the operating system is containing the malicious process.

    B. A page fault is occurring, which forces the operating system to write data from the hard drive.

    C. Malware is executing in either ROM or a cache memory area.

    D. Malicious code is attempting to execute instruction in a non-executable memory region.

  • Question 286:

    Bob learned that his username and password for a popular game has been compromised. He contacts the company and resets all the information. The company suggests he use two-factor authentication, which option below offers that?

    A. A new username and password

    B. A fingerprint scanner and his username and password.

    C. Disable his username and use just a fingerprint scanner.

    D. His username and a stronger password.

  • Question 287:

    The network in ABC company is using the network address 192.168.1.64 with mask 255.255.255.192. In

    the network the servers are in the addresses 192.168.1.122, 192.168.1.123 and 192.168.1.124.

    An attacker is trying to find those servers but he cannot see them in his scanning. The command he is

    using is:

    nmap 192.168.1.64/28.

    Why he cannot see the servers?

    A. The network must be down and the nmap command and IP address are ok.

    B. He needs to add the command ''''ip address'''' just before the IP address.

    C. He is scanning from 192.168.1.64 to 192.168.1.78 because of the mask /28 and the servers are not in that range.

    D. He needs to change the address to 192.168.1.0 with the same mask.

  • Question 288:

    Sophia travels a lot and worries that her laptop containing confidential documents might be stolen. What is the best protection that will work for her?

    A. Password protected files

    B. Hidden folders

    C. BIOS password

    D. Full disk encryption.

  • Question 289:

    Which of the following is considered an exploit framework and has the ability to perform automated attacks on services, ports, applications and unpatched security flaws in a computer system?

    A. Wireshark

    B. Maltego

    C. Metasploit

    D. Nessus

  • Question 290:

    Which of these is capable of searching for and locating rogue access points?

    A. HIDS

    B. WISS

    C. WIPS

    D. NIDS

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.