Exam Details

  • Exam Code
    :312-50V9
  • Exam Name
    :Certified Ethical Hacker Exam V9
  • Certification
    :CEH V9
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :614 Q&As
  • Last Updated
    :May 10, 2024

EC-COUNCIL CEH V9 312-50V9 Questions & Answers

  • Question 31:

    Which security strategy requires using several, varying methods to protect IT systems against attacks?

    A. Defense in depth

    B. Three-way handshake

    C. Covert channels

    D. Exponential backoff algorithm

  • Question 32:

    Which of the following levels of algorithms does Public Key Infrastructure (PKI) use?

    A. RSA 1024 bit strength

    B. AES 1024 bit strength

    C. RSA 512 bit strength

    D. AES 512 bit strength

  • Question 33:

    Which of the following is a characteristic of Public Key Infrastructure (PKI)?

    A. Public-key cryptosystems are faster than symmetric-key cryptosystems.

    B. Public-key cryptosystems distribute public-keys within digital signatures.

    C. Public-key cryptosystems do not require a secure key distribution channel.

    D. Public-key cryptosystems do not provide technical non-repudiation via digital signatures.

  • Question 34:

    A network security administrator is worried about potential man-in-the-middle attacks when users access a corporate web site from their workstations. Which of the following is the best remediation against this type of attack?

    A. Implementing server-side PKI certificates for all connections

    B. Mandating only client-side PKI certificates for all connections

    C. Requiring client and server PKI certificates for all connections

    D. Requiring strong authentication for all DNS queries

  • Question 35:

    Which of the following defines the role of a root Certificate Authority (CA) in a Public Key Infrastructure (PKI)?

    A. The root CA is the recovery agent used to encrypt data when a user's certificate is lost.

    B. The root CA stores the user's hash value for safekeeping.

    C. The CA is the trusted root that issues certificates.

    D. The root CA is used to encrypt email messages to prevent unintended disclosure of data.

  • Question 36:

    Company A and Company B have just merged and each has its own Public Key Infrastructure (PKI). What must the Certificate Authorities (CAs) establish so that the private PKIs for Company A and Company B trust one another and each private PKI can validate digital certificates from the other company?

    A. Poly key exchange

    B. Cross certification

    C. Poly key reference D. Cross-site exchange

  • Question 37:

    Some passwords are stored using specialized encryption algorithms known as hashes. Why is this an appropriate method?

    A. It is impossible to crack hashed user passwords unless the key used to encrypt them is obtained.

    B. If a user forgets the password, it can be easily retrieved using the hash key stored by administrators.

    C. Hashing is faster compared to more traditional encryption algorithms.

    D. Passwords stored using hashes are non-reversible, making finding the password much more difficult.

  • Question 38:

    For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with which key?

    A. Sender's public key

    B. Receiver's private key

    C. Receiver's public key

    D. Sender's private key

  • Question 39:

    In the OSI model, where does PPTP encryption take place?

    A. Transport layer

    B. Application layer

    C. Data link layer

    D. Network layer

  • Question 40:

    Which of the following is an example of IP spoofing?

    A. SQL injections

    B. Man-in-the-middle

    C. Cross-site scripting

    D. ARP poisoning

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.