Pass4itsure > EC-COUNCIL > CEH V9 > 312-50V9 > 312-50V9 Online Practice Questions and Answers

312-50V9 Online Practice Questions and Answers

Questions 4

What is the best Nmap command to use when you want to list all devices in the same network quickly after you successfully identified a server whose IP address is 10.10.0.5?

A. nmap -T4 -F 10.10.0.0/24

B. nmap -T4 -q 10.10.0.0/24

C. nmap -T4 -O 10.10.0.0/24

D. nmap -T4 -r 10.10.1.0/24

Buy Now
Questions 5

Every company needs a formal written document which spells out to employees precisely what they are allowed to use the company's systems for, what is prohibited, and what will happen to them if they break the rules. Two printed copies of the policy should be given to every employee as soon as possible after they join the organization. The employee should be asked to sign one copy, which should be safely filed by the company. No one should be allowed to use the company's computer systems until they have signed the policy in acceptance of its terms.

What is this document called?

A. Information Audit Policy (IAP)

B. Information Security Policy (ISP)

C. Penetration Testing Policy (PTP)

D. Company Compliance Policy (CCP)

Buy Now
Questions 6

You are logged in as a local admin on a Windows 7 system and you need to launch the Computer Management Console from command line.

Which command would you use?

A. c:\compmgmt.msc

B. c:\services.msc

C. c:\ncpa.cp

D. c:\gpedit

Buy Now
Questions 7

Which of the following is not a Bluetooth attack?

A. Bluedriving

B. Bluejacking

C. Bluesmacking

D. Bluesnarfing

Buy Now
Questions 8

A network administrator discovers several unknown files in the root directory of his Linux FTP server. One of the files is a tarball, two are shell script files, and the third is a binary file is named "nc." The FTP server's access logs show that the anonymous user account logged in to the server, uploaded the files, and extracted the contents of the tarball and ran the script using a function provided by the FTP server's software. The ps command shows that the nc file is running as process, and the netstat command shows the nc process is listening on a network port.

What kind of vulnerability must be present to make this remote attack possible?

A. File system permissions

B. Privilege escalation

C. Directory traversal

D. Brute force login

Buy Now
Questions 9

_________ is a set of extensions to DNS that provide to DNS clients (resolvers) origin authentication of DNS data to reduce the threat of DNS poisoning, spoofing, and similar attacks types.

A. DNSSEC

B. Zone transfer

C. Resource transfer

D. Resource records

Buy Now
Questions 10

An attacker uses a communication channel within an operating system that is neither designed nor intended to transfer information. What is the name of the communications channel?

A. Classified

B. Overt

C. Encrypted

D. Covert

Buy Now
Questions 11

A penetration tester is attempting to scan an internal corporate network from the internet without alerting the border sensor. Which is the most efficient technique should the tester consider using?

A. Spoofing an IP address

B. Tunneling scan over SSH

C. Tunneling over high port numbers

D. Scanning using fragmented IP packets

Buy Now
Questions 12

What is the broadcast address for the subnet 190.86.168.0/22?

A. 190.86.168.255

B. 190.86.255.255

C. 190.86.171.255

D. 190.86.169.255

Buy Now
Questions 13

The Open Web Application Security Project (OWASP) testing methodology addresses the need to secure web applications by providing which one of the following services?

A. An extensible security framework named COBIT

B. A list of flaws and how to fix them

C. Web application patches

D. A security certification for hardened web applications

Buy Now
Exam Code: 312-50V9
Exam Name: Certified Ethical Hacker Exam V9
Last Update: Apr 16, 2024
Questions: 614
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99