Exam Details

  • Exam Code
    :312-50V9
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :614 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V9 Questions & Answers

  • Question 351:

    An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up.

    What is the most likely cause?

    A. The network devices are not all synchronized.

    B. Proper chain of custody was not observed while collecting the logs.

    C. The attacker altered or erased events from the logs.

    D. The security breach was a false positive.

  • Question 352:

    Which of the following is the greatest threat posed by backups?

    A. A backup is the source of Malware or illicit information.

    B. A backup is unavailable during disaster recovery.

    C. A backup is incomplete because no verification was performed.

    D. An un-encrypted backup can be misplaced or stolen.

  • Question 353:

    Which of the following is assured by the use of a hash?

    A. Integrity

    B. Confidentiality

    C. Authentication

    D. Availability

  • Question 354:

    Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?

    A. ESP transport mode

    B. AH permiscuous

    C. ESP confidential

    D. AH Tunnel mode

  • Question 355:

    Which of the following is a design pattern based on distinct pieces of software providing application functionality as services to other applications?

    A. Service Oriented Architecture

    B. Object Oriented Architecture

    C. Lean Coding

    D. Agile Process

  • Question 356:

    Which of the following is the structure designed to verify and authenticate the identity of individuals within the enterprise taking part in a data exchange?

    A. PKI

    B. single sign on

    C. biometrics

    D. SOA

  • Question 357:

    Which of the following is an extremely common IDS evasion technique in the web world?

    A. unicode characters

    B. spyware

    C. port knocking

    D. subnetting

  • Question 358:

    The configuration allows a wired or wireless network interface controller to pass all traffic it receives to the central processing unit (CPU), rather than passing only the frames that the controller is intended to receive.

    Which of the following is being described?

    A. promiscuous mode

    B. port forwarding

    C. multi-cast mode

    D. WEM

  • Question 359:

    Which of the following is a command line packet analyzer similar to GUI-based Wireshark?

    A. tcpdump

    B. nessus

    C. etherea

    D. Jack the ripper

  • Question 360:

    You are using NMAP to resolve domain names into IP addresses for a ping sweep later.

    Which of the following commands looks for IP addresses?

    A. >host -t a hackeddomain.com

    B. >host -t soa hackeddomain.com

    C. >host -t ns hackeddomain.com

    D. >host -t AXFR hackeddomain.com

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.