EC-Council 312-50v9 Study Guides 2021

We provide 312 50v9 pdf in two formats. Download PDF & Practice Tests. Pass EC-Council 312-50v9 Exam quickly & easily. The 312-50v9 PDF type is available for reading and printing. You can print more and practice many times. With the help of our 312 50v9 pdf product and material, you can easily pass the 312-50v9 exam.

Online EC-Council 312-50v9 free dumps demo Below:

NEW QUESTION 1
An Intrusion Detection System(IDS) has alerted the network administrator to a possibly malicious sequence of packets went to a Web server in the network’s external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file.
What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?

  • A. Protocol analyzer
  • B. Intrusion Prevention System (IPS)
  • C. Vulnerability scanner
  • D. Network sniffer

Answer: B

NEW QUESTION 2
It is a regulation that has a set if guideline,which should be adhered to by anyone who handles any electronic medical data. These guidelines stipulate that all medical practices must ensure that all necessary measures are in place while saving, accessing, and sharing any electronic medical data to keep patient data secure.
Which of the following regulations best matches the description?

  • A. HIPAA
  • B. COBIT
  • C. ISO/IEC 27002
  • D. FISMA

Answer: A

NEW QUESTION 3
This asymmetry cipther is based on factoring the product of two large prime numbers. What cipher is described above?

  • A. SHA
  • B. RC5
  • C. RSA
  • D. MD5

Answer: C

NEW QUESTION 4
It isan entity or event with the potential to adversely impact a system through unauthorized access destruction disclosures denial of service or modification of data.
Which of the following terms best matches this definition?

  • A. Threat
  • B. Attack
  • C. Risk
  • D. Vulnerability

Answer: A

NEW QUESTION 5
Initiating an attack against targeted businesses and organizations, threat actors compromise a carefully selected website byinserting an exploit resulting in malware infection. The attackers run exploits on well-known and trusted sites likely to be visited by their targeted victims. Aside from carefully choosing sites to compromise, these attacks are known toincorporate zero-day exploits that target unpatched vulnerabilities. Thus, the targeted entities are left with little or no defense against these exploits.
What type of attack is outlined in the scenario?

  • A. Watering Hole Attack
  • B. Spear Phising Attack
  • C. Heartbleed Attack
  • D. Shellshock Attack

Answer: A

NEW QUESTION 6
A common cryptographically tool is the use of XOR. XOR the following binary value: 10110001
00111010

  • A. 10001011
  • B. 10011101
  • C. 11011000
  • D. 10111100

Answer: A

NEW QUESTION 7
What does a firewall check to prevent particularports and applications from getting packets into an organizations?

  • A. Transport layer port numbers and application layer headers
  • B. Network layer headers and the session layer port numbers
  • C. Application layer port numbers and the transport layer headers
  • D. Presentation layer headers and the session layer port numbers

Answer: A

NEW QUESTION 8
A network administrator discovers several unknown files in the root directory of his Linux FTP server. One of the files is a tarball, two are shallscript files, and the third is a binary file is named “nc.” The FTP server’s access logs show that the anonymous user account logged in the server, uploaded the files, and extracted the contents of the tarball and ran the script using a function providedby the FTP server’s software. The ps command shows that the nc file is running as process, and the netstat command shows the nc process is listening on a network port.
Which kind of vulnerability must be present to make this remote attack possible?

  • A. Filesystem permissions
  • B. Brute Force Login
  • C. Privilege Escalation
  • D. Directory Traversal

Answer: D

NEW QUESTION 9
When you are collecting information to perform a dataanalysis, Google commands are very useful to find sensitive information and files. These files may contain information about passwords, system functions, or documentation.
What command will help you to search files using Google as a search engine?

  • A. site:target.com file:xls username password email
  • B. domain: target.com archive:xls username password email
  • C. site: target.com filetype:xls username password email
  • D. inurl: target.com filename:xls username password email

Answer: C

NEW QUESTION 10
The phase will increase the odds of success in later phases of the penetration test. It is also the very first step in Information Gathering, and it will tell you what the“landscape” looks like.
What is the most important phase of ethical hacking in which you need to spend a considerable amount of time?

  • A. Network Mapping
  • B. Gaining access
  • C. Footprinting
  • D. Escalating privileges

Answer: C

NEW QUESTION 11
When you are testing a web application, it is very useful to employ a prosy tool to save every request and response.Nyou can manually test every request and analyze the response to find vulnerabilities. You can test parameter and headers manually to get more precise results than if using web vulnerability scanners.
What proxy tool will help you find web vulnerabilities?

  • A. Burpsuite
  • B. Dimitry
  • C. Proxychains
  • D. Maskgen

Answer: A

NEW QUESTION 12
Which of the following isthe greatest threat posed by backups?

  • A. An un-encrypted backup can be misplaced or stolen
  • B. A back is incomplete because no verification was performed.
  • C. A backup is the source of Malware or illicit information.
  • D. A backup is unavailable duringdisaster recovery.

Answer: A

NEW QUESTION 13
Which of the following tools can be used for passiveOS fingerprinting?

  • A. tcpdump
  • B. ping
  • C. nmap
  • D. Tracert

Answer: C

NEW QUESTION 14
You are attempting to man-in-the-middle a session. Which protocol will allow you to guess a sequence number?

  • A. ICMP
  • B. TCP
  • C. UDP
  • D. UPX

Answer: B

NEW QUESTION 15
You are usingNMAP to resolve domain names into IP addresses for a ping sweep later. Which of the following commands looks for IP addresses?

  • A. >host –t ns hackeddomain.com
  • B. >host –t AXFR hackeddomain.com
  • C. >host –t soa hackeddomain.com
  • D. >host –t a hackeddomain.com

Answer: D

NEW QUESTION 16
Which of the following is a protocol specifically designed for transporting event messages?

  • A. SMS
  • B. SNMP
  • C. SYSLOG
  • D. ICMP

Answer: C

NEW QUESTION 17
The security concept of “separation of duties” is most similar to the operation ofwhich type of security device?

  • A. Bastion host
  • B. Honeypot
  • C. Firewall
  • D. Intrusion Detection System

Answer: C

P.S. Certleader now are offering 100% pass ensure 312-50v9 dumps! All 312-50v9 exam questions have been updated with correct answers: https://www.certleader.com/312-50v9-dumps.html (125 New Questions)