Exam Details

  • Exam Code
    :312-50V9
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :614 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V9 Questions & Answers

  • Question 321:

    Which of the following tools is used to analyze the files produced by several packet-capture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?

    A. tcptrace

    B. tcptraceroute

    C. Nessus

    D. OpenVAS

  • Question 322:

    Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?

    A. Nikto

    B. Snort

    C. John the Ripper

    D. Dsniff

  • Question 323:

    What is the most common method to exploit the "Bash Bug" or "ShellShock" vulnerability?

    A. Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web server

    B. Manipulate format strings in text fields

    C. SSH

    D. SYN Flood

  • Question 324:

    Which method of password cracking takes the most time and effort?

    A. Brute force

    B. Rainbow tables

    C. Dictionary attack

    D. Shoulder surfing

  • Question 325:

    PGP, SSL, and IKE are all examples of which type of cryptography?

    A. Public Key

    B. Secret Key

    C. Hash Algorithm

    D. Digest

  • Question 326:

    Which of the following is a low-tech way of gaining unauthorized access to systems?

    A. Social Engineering

    B. Sniffing

    C. Eavesdropping

    D. Scanning

  • Question 327:

    Which of the following is designed to identify malicious attempts to penetrate systems?

    A. Intrusion Detection System

    B. Firewall

    C. Proxy

    D. Router

  • Question 328:

    Risks = Threats x Vulnerabilities is referred to as the:

    A. Risk equation

    B. Threat assessment

    C. BIA equation

    D. Disaster recovery formula

  • Question 329:

    What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?

    A. Residual risk

    B. Inherent risk

    C. Deferred risk

    D. Impact risk

  • Question 330:

    Which of these options is the most secure procedure for storing backup tapes?

    A. In a climate controlled facility offsite

    B. On a different floor in the same building

    C. Inside the data center for faster retrieval in a fireproof safe

    D. In a cool dry environment

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.