Exam Details

  • Exam Code
    :312-50V9
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :614 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V9 Questions & Answers

  • Question 381:

    You are performing information gathering for an important penetration test. You have found pdf, doc, and images in your objective. You decide to extract metadata from these files and analyze it.

    What tool will help you with the task?

    A. Metagoofil

    B. Armitage

    C. Dimitry

    D. cdpsnarf

  • Question 382:

    How does the Address Resolution Protocol (ARP) work?

    A. It sends a request packet to all the network elements, asking for the MAC address from a specific IP.

    B. It sends a reply packet to all the network elements, asking for the MAC address from a specific IP.

    C. It sends a reply packet for a specific IP, asking for the MAC address.

    D. It sends a request packet to all the network elements, asking for the domain name from a specific IP.

  • Question 383:

    Which regulation defines security and privacy controls for Federal information systems and organizations?

    A. NIST-800-53

    B. PCI-DSS

    C. EU Safe Harbor

    D. HIPAA

  • Question 384:

    Your team has won a contract to infiltrate an organization. The company wants to have the attack be as realistic as possible; therefore, they did not provide any information besides the company name.

    What should be the first step in security testing the client?

    A. Reconnaissance

    B. Enumeration

    C. Scanning

    D. Escalation

  • Question 385:

    You are attempting to man-in-the-middle a session. Which protocol will allow you to guess a sequence number?

    A. TCP

    B. UPD

    C. ICMP

    D. UPX

  • Question 386:

    Which of the following is the successor of SSL?

    A. TLS

    B. RSA

    C. GRE

    D. IPSec

  • Question 387:

    A common cryptographical tool is the use of XOR. XOR the following binary values: 10110001 00111010

    A. 10001011

    B. 11011000

    C. 10011101

    D. 10111100

  • Question 388:

    Using Windows CMD, how would an attacker list all the shares to which the current user context has access?

    A. NET USE

    B. NET CONFIG

    C. NET FILE

    D. NET VIEW

  • Question 389:

    An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", that the user is directed to a phishing site.

    Which file does the attacker need to modify?

    A. Hosts

    B. Sudoers

    C. Boot.ini

    D. Networks

  • Question 390:

    After trying multiple exploits, you've gained root access to a Centos 6 server. To ensure you maintain access, what would you do first?

    A. Create User Account

    B. Disable Key Services

    C. Disable IPTables

    D. Download and Install Netcat

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.