Exam Details

  • Exam Code
    :312-50V9
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :614 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V9 Questions & Answers

  • Question 361:

    > NMAP -sn 192.168.11.200-215

    The NMAP command above performs which of the following?

    A. A ping scan

    B. A trace sweep

    C. An operating system detect

    D. A port scan

  • Question 362:

    The purpose of a __________ is to deny network access to local area networks and other information assets by unauthorized wireless devices.

    A. Wireless Intrusion Prevention System

    B. Wireless Access Point

    C. Wireless Access Control List

    D. Wireless Analyzer

  • Question 363:

    This phase will increase the odds of success in later phases of the penetration test. It is also the very first step in Information Gathering, and it will tell you what the "landscape" looks like.

    What is the most important phase of ethical hacking in which you need to spend a considerable amount of time?

    A. footprinting

    B. network mapping

    C. gaining access

    D. escalating privileges

  • Question 364:

    Which of the following is not a Bluetooth attack?

    A. Bluedriving

    B. Bluejacking

    C. Bluesmacking

    D. Bluesnarfing

  • Question 365:

    A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing in concluding the Operating System (OS) version installed. Considering the NMAP result below, which of the following is likely to be installed on the target machine by the OS?

    A. The host is likely a printer.

    B. The host is likely a Windows machine.

    C. The host is likely a Linux machine.

    D. The host is likely a router.

  • Question 366:

    Which of the following is the least-likely physical characteristic to be used in biometric control that supports a large company?

    A. Height and Weight

    B. Voice

    C. Fingerprints

    D. Iris patterns

  • Question 367:

    You have several plain-text firewall logs that you must review to evaluate network traffic. You know that in order to do fast, efficient searches of the logs you must use regular expressions.

    Which command-line utility are you most likely to use?

    A. Grep

    B. Notepad

    C. MS Excel

    D. Relational Database

  • Question 368:

    You've just been hired to perform a pen test on an organization that has been subjected to a large-scale attack. The CIO is concerned with mitigating threats and vulnerabilities to totally eliminate risk.

    What is one of the first things you should do when given the job?

    A. Explain to the CIO that you cannot eliminate all risk, but you will be able to reduce risk to acceptable levels.

    B. Interview all employees in the company to rule out possible insider threats.

    C. Establish attribution to suspected attackers.

    D. Start the wireshark application to start sniffing network traffic.

  • Question 369:

    You are performing a penetration test. You achieved access via a buffer overflow exploit and you proceed to find interesting data, such as files with usernames and passwords. You find a hidden folder that has the administrator's bank account password and login information for the administrator's bitcoin account.

    What should you do?

    A. Report immediately to the administrator

    B. Do not report it and continue the penetration test.

    C. Transfer money from the administrator's account to another account.

    D. Do not transfer the money but steal the bitcoins.

  • Question 370:

    Which of the following describes the characteristics of a Boot Sector Virus?

    A. Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR

    B. Moves the MBR to another location on the RAM and copies itself to the original location of the MBR

    C. Modifies directory table entries so that directory entries point to the virus code instead of the actual program

    D. Overwrites the original MBR and only executes the new virus code

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.