Download Certified Ethical Hacker (312-50v9).312-50v9.CertDumps.2017-09-12.501q.vcex

Vendor: ECCouncil
Exam Code: 312-50v9
Exam Name: Certified Ethical Hacker (312-50v9)
Date: Sep 12, 2017
File Size: 586 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
A recent security audit revealed that there were indeed several occasions that the company's network was breached. After investigating, you discover that your IDS is not configured properly and therefore is unable to trigger alarms when needed. What type of alert is the IDS giving?
  1. True Positive
  2. False Negative
  3. False Positive
  4. False Positive
Correct answer: B
Question 2
Which type of cryptography does SSL, IKE and PGP belongs to?
  1. Secret Key
  2. Hash Algorithm
  3. Digest
  4. Public Key
Correct answer: D
Question 3
Supposed you are the Chief Network Engineer of a certain Telco. Your company is planning for a big business expansion and it requires that your network authenticate users connecting using analog modems, Digital
Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relaynetwork. Which AAA protocol would you implement?
  1. TACACS+
  3. Kerberos
Correct answer: D
Question 4
A hacker was able to easily gain access to a website. He was able to log in via the frontend user login form of the website using default or commonly used credentials. This exploitation is an example of what Software design flaw?
  1. Insufficient security management
  2. Insufficient database hardening
  3. Insufficient input validation
  4. Insufficient exception handling
Correct answer: B
Question 5
While performing online banking using a Web browser, Kyle receives an email that contains an image of a wellcrafted art. Upon clicking the image, a new tab on the web browser opens and shows an animated GIF of bills and coins being swallowed by a crocodile. After several days, Kyle noticed that all his funds on the bank was gone. What Web browser-based security vulnerability got exploited by the hacker?
  1. Clickjacking
  2. Web Form Input Validation
  3. Cross-Site Request Forgery
  4. Cross-Site Scripting
Correct answer: C
Question 6
[email protected] _server:~$ nmap -T4 -0
TCP/IP fingerprinting (for OS scan) xxxxxxx xxxxxx xxxxxxxxx. QUITTING!
Obviously, it is not going through. What is the issue here?
  1. OS Scan requires root privileges
  2. The nmap syntax is wrong.
  3. The outgoing TCP/IP fingerprinting is blocked by the host firewall
  4. This is a common behavior for a corrupted nmap application
Correct answer: A
Question 7
When security and confidentiality of data within the same LAN is of utmost priority, which IPSec mode should you implement?
  1. AH Tunnel mode
  2. AH promiscuous
  3. ESP transport mode
  4. ESP confidential
Correct answer: C
Question 8
Which of the following is a vulnerability in GNU's bash shell (discovered in September of 2014) that gives attackers access to run remote commands on a vulnerable system?
  1. Shellshock
  2. Rootshell
  3. Rootshock
  4. Shellbash
Correct answer: A
Question 9
Which of the following is a restriction being enforced in "white box testing?"
  1. Only the internal operation of a system is known to the tester
  2. The internal operation of a system is completely known to the tester
  3. The internal operation of a system is only partly accessible to the tester
  4. Only the external operation of a system is accessible to the tester
Correct answer: B
Question 10
Which specific element of security testing is being assured by using hash?
  1. Authentication
  2. Integrity
  3. Confidentiality
  4. Availability
Correct answer: B

Use VCE Exam Simulator to open VCE files


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!