Exam Details

  • Exam Code
    :312-50V9
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :614 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V9 Questions & Answers

  • Question 401:

    Jesse receives an email with an attachment labeled "Court_Notice_21206.zip". Inside the zip file is a file named "Court_Notice_21206.docx.exe" disguised as a word document. Upon execution, a window appears stating, "This word document is corrupt." In the background, the file copies itself to Jesse APPDATA\local directory and begins to beacon to a C2 server to download additional malicious binaries.

    What type of malware has Jesse encountered?

    A. Trojan

    B. Worm

    C. Macro Virus

    D. Key-Logger

  • Question 402:

    This tool is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools.

    Which of the following tools is being described?

    A. Aircrack-ng

    B. Airguard

    C. WLAN-crack

    D. wificracker

  • Question 403:

    The Heartbleed bug was discovered in 2014 and is widely referred to under MITRE's Common Vulnerabilities and Exposures (CVE) as CVE-2014-0160. This bug affects the OpenSSL implementation of the transport layer security (TLS) protocols defined in RFC6520.

    What type of key does this bug leave exposed to the Internet making exploitation of any compromised system very easy?

    A. Private

    B. Public

    C. Shared

    D. Root

  • Question 404:

    A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server.

    Based on this information, what should be one of your key recommendations to the bank?

    A. Place a front-end web server in a demilitarized zone that only handles external web traffic

    B. Require all employees to change their passwords immediately

    C. Move the financial data to another server on the same IP subnet

    D. Issue new certificates to the web servers from the root certificate authority

  • Question 405:

    Port scanning can be used as part of a technical assessment to determine network vulnerabilities. The TCP XMAS scan is used to identify listening ports on the targeted system.

    If a scanned port is open, what happens?

    A. The port will ignore the packets.

    B. The port will send an RST.

    C. The port will send an ACK.

    D. The port will send a SYN.

  • Question 406:

    During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a Demilitarized Zone (DMZ) and a second DNS server on the internal network.

    What is this type of DNS configuration commonly called?

    A. Split DNS

    B. DNSSEC

    C. DynDNS

    D. DNS Scheme

  • Question 407:

    The network administrator contacts you and tells you that she noticed the temperature on the internal wireless router increases by more than 20% during weekend hours when the office was closed. She asks you to investigate the issue because she is busy dealing with a big conference and she doesn't have time to perform the task.

    What tool can you use to view the network traffic being sent and received by the wireless router?

    A. Wireshark

    B. Nessus

    C. Netcat

    D. Netstat

  • Question 408:

    When you return to your desk after a lunch break, you notice a strange email in your inbox. The sender is someone you did business with recently, but the subject line has strange characters in it.

    What should you do?

    A. Forward the message to your company's security response team and permanently delete the message from your computer.

    B. Reply to the sender and ask them for more information about the message contents.

    C. Delete the email and pretend nothing happened

    D. Forward the message to your supervisor and ask for her opinion on how to handle the situation

  • Question 409:

    It is a vulnerability in GNU's bash shell, discovered in September of 2014, that gives attackers access to run remote commands on a vulnerable system. The malicious software can take control of an infected machine, launch denial-of-service attacks to disrupt websites, and scan for other vulnerable devices (including routers).

    Which of the following vulnerabilities is being described?

    A. Shellshock

    B. Rootshock

    C. Rootshell

    D. Shellbash

  • Question 410:

    An attacker changes the profile information of a particular user (victim) on the target website. The attacker uses this string to update the victim's profile to a text file and then submit the data to the attacker's database.

    What is this type of attack (that can use either HTTP GET or HTTP POST) called?

    A. Cross-Site Request Forgery

    B. Cross-Site Scripting

    C. SQL Injection

    D. Browser Hacking

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.