Exam Details

  • Exam Code
    :312-50V9
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :614 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V9 Questions & Answers

  • Question 371:

    The Open Web Application Security Project (OWASP) is the worldwide not-for-profit charitable organization focused on improving the security of software. What item is the primary concern on OWASP's Top Ten Project Most Critical Web Application Security Risks?

    A. Injection

    B. Cross Site Scripting

    C. Cross Site Request Forgery

    D. Path disclosure

  • Question 372:

    Which of the following parameters describe LM Hash (see exhibit):

    Exhibit:

    A. I, II, and III

    B. I

    C. II

    D. I and II

  • Question 373:

    What is the process of logging, recording, and resolving events that take place in an organization?

    A. Incident Management Process

    B. Security Policy

    C. Internal Procedure

    D. Metrics

  • Question 374:

    This asymmetry cipher is based on factoring the product of two large prime numbers.

    What cipher is described above?

    A. RSA

    B. SHA

    C. RC5

    D. MD5

  • Question 375:

    When you are getting information about a web server, it is very important to know the HTTP Methods (GET, POST, HEAD, PUT, DELETE, TRACE) that are available because there are two critical methods (PUT and DELETE). PUT can upload a file to the server and DELETE can delete a file from the server.

    You can detect all these methods (GET, POST, HEAD, PUT, DELETE, TRACE) using NMAP script engine.

    What nmap script will help you with this task?

    A. http-methods

    B. http enum

    C. http-headers

    D. http-git

  • Question 376:

    When you are testing a web application, it is very useful to employ a proxy tool to save every request and response. You can manually test every request and analyze the response to find vulnerabilities. You can test parameter and headers manually to get more precise results than if using web vulnerability scanners.

    What proxy tool will help you find web vulnerabilities?

    A. Burpsuite

    B. Maskgen

    C. Dimitry

    D. Proxychains

  • Question 377:

    You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine.

    What wireshark filter will show the connections from the snort machine to kiwi syslog machine?

    A. tcp.dstport==514 andand ip.dst==192.168.0.150

    B. tcp.srcport==514 andand ip.src==192.168.0.99

    C. tcp.dstport==514 andand ip.dst==192.168.0.0/16

    D. tcp.srcport==514 andand ip.src==192.168.150

  • Question 378:

    When you are collecting information to perform a data analysis, Google commands are very useful to find sensitive information and files. These files may contain information about passwords, system functions, or documentation.

    What command will help you to search files using Google as a search engine?

    A. site: target.com filetype:xls username password email

    B. inurl: target.com filename:xls username password email

    C. domain: target.com archive:xls username password email

    D. site: target.com file:xls username password email

  • Question 379:

    What is a "Collision attack" in cryptography?

    A. Collision attacks try to find two inputs producing the same hash.

    B. Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key.

    C. Collision attacks try to get the public key.

    D. Collision attacks try to break the hash into three parts to get the plaintext value.

  • Question 380:

    You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist's email, and you send her an email changing the source email to her boss's email ( boss@company ). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with links. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don't work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network.

    What testing method did you use?

    A. Social engineering

    B. Tailgating

    C. Piggybacking

    D. Eavesdropping

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.