Download Certified Ethical Hacker (312-50v9).312-50.ExamTopics.2025-06-05.118q.vcex

Vendor: ECCouncil
Exam Code: 312-50
Exam Name: Certified Ethical Hacker (312-50v9)
Date: Jun 05, 2025
File Size: 971 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

ProfExam Discount

Demo Questions

Question 1
How do employers protect assets with security policies pertaining to employee surveillance activities?
  1. Employers promote monitoring activities of employees as long as the employees demonstrate trustworthiness.
  2. Employers use informal verbal communication channels to explain employee monitoring activities to employees.
  3. Employers use network surveillance to monitor employee email traffic, network access, and to record employee keystrokes.
  4. Employers provide employees written statements that clearly discuss the boundaries of monitoring activities and consequences.
Correct answer: D
Question 2
Which of the following is a component of a risk assessment?
  1. Physical security
  2. Administrative safeguards
  3. DMZ
  4. Logical interface
Correct answer: B
Question 3
When utilizing technical assessment methods to assess the security posture of a network, which of the following techniques would be most effective in determining whether end-user security training would be beneficial?
  1. Vulnerability scanning
  2. Social engineering
  3. Application security testing
  4. Network sniffing
Correct answer: B
Question 4
Which of the following tools can be used for passive OS fingerprinting?
  1. tcpdump
  2. nmap
  3. ping
  4. tracert
Correct answer: A
Question 5
You are the Systems Administrator for a large corporate organization. You need to monitor all network traffic on your local network for suspicious activities and receive notifications when an attack is occurring. Which tool would allow you to accomplish this goal?
  1. Network-based IDS
  2. Firewall
  3. Proxy
  4. Host-based IDS
Correct answer: A
Question 6
What does a firewall check to prevent particular ports and applications from getting packets into an organization?
  1. Transport layer port numbers and application layer headers
  2. Presentation layer headers and the session layer port numbers
  3. Network layer headers and the session layer port numbers
  4. Application layer port numbers and the transport layer headers
Correct answer: A
Question 7
Which of the following is a common Service Oriented Architecture (SOA) vulnerability?
  1. Cross-site scripting
  2. SQL injection
  3. VPath injection
  4. XML denial of service issues D
Correct answer: Explanation
Question 8
Which of the following types of firewalls ensures that the packets are part of the established session?
  1. Stateful inspection firewall
  2. Circuit-level firewall
  3. Application-level firewall
  4. Switch-level firewall
Correct answer: A
Question 9
Which of the following statements regarding ethical hacking is incorrect?
  1. Ethical hackers should never use tools or methods that have the potential of exploiting vulnerabilities in an organization's systems.
  2. Testing should be remotely performed offsite.
  3. An organization should use ethical hackers who do not sell vendor hardware/software or other consulting services.
  4. Ethical hacking should not involve writing to or modifying the target systems.
Correct answer: A
Question 10
Which of the following techniques will identify if computer files have been changed?
  1. Network sniffing
  2. Permission sets
  3. Integrity checking hashes
  4. Firewall alerts
Correct answer: C
Question 11
A hacker has managed to gain access to a Linux host and stolen the password file from /etc/passwd. How can he use it?
  1. The password file does not contain the passwords themselves.
  2. He can open it and read the user ids and corresponding passwords.
  3. The file reveals the passwords to the root user only.
  4. He cannot read it because it is encrypted.
Correct answer: A
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!