Exam Details

  • Exam Code
    :312-50V9
  • Exam Name
    :Certified Ethical Hacker Exam V9
  • Certification
    :CEH V9
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :614 Q&As
  • Last Updated
    :May 10, 2024

EC-COUNCIL CEH V9 312-50V9 Questions & Answers

  • Question 41:

    The Open Web Application Security Project (OWASP) testing methodology addresses the need to secure web applications by providing which one of the following services?

    A. An extensible security framework named COBIT

    B. A list of flaws and how to fix them

    C. Web application patches

    D. A security certification for hardened web applications

  • Question 42:

    Which of the following is an advantage of utilizing security testing methodologies to conduct a security audit?

    A. They provide a repeatable framework.

    B. Anyone can run the command line scripts.

    C. They are available at low cost.

    D. They are subject to government regulation.

  • Question 43:

    While testing the company's web applications, a tester attempts to insert the following test script into the search area on the company's web site:

    Afterwards, when the tester presses the search button, a pop-up box appears on the screen with the text: "Testing Testing Testing". Which vulnerability has been detected in the web application?

    A. Buffer overflow

    B. Cross-site request forgery

    C. Distributed denial of service

    D. Cross-site scripting

  • Question 44:

    Employees in a company are no longer able to access Internet web sites on their computers. The network administrator is able to successfully ping IP address of web servers on the Internet and is able to open web sites by using an IP address in place of the URL. The administrator runs the nslookup command for www.eccouncil.org and receives an error message stating there is no response from the server. What should the administrator do next?

    A. Configure the firewall to allow traffic on TCP ports 53 and UDP port 53.

    B. Configure the firewall to allow traffic on TCP ports 80 and UDP port 443.

    C. Configure the firewall to allow traffic on TCP port 53.

    D. Configure the firewall to allow traffic on TCP port 8080.

  • Question 45:

    Which of the following network attacks takes advantage of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?

    A. Teardrop

    B. SYN flood

    C. Smurf attack

    D. Ping of death

  • Question 46:

    Which of the following descriptions is true about a static NAT?

    A. A static NAT uses a many-to-many mapping.

    B. A static NAT uses a one-to-many mapping.

    C. A static NAT uses a many-to-one mapping.

    D. A static NAT uses a one-to-one mapping.

  • Question 47:

    If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which other option could the tester use to get a response from a host using TCP?

    A. Hping

    B. Traceroute

    C. TCP ping

    D. Broadcast ping

  • Question 48:

    Which of the following items is unique to the N-tier architecture method of designing software applications?

    A. Application layers can be separated, allowing each layer to be upgraded independently from other layers.

    B. It is compatible with various databases including Access, Oracle, and SQL.

    C. Data security is tied into each layer and must be updated for all layers when any upgrade is performed.

    D. Application layers can be written in C, ASP.NET, or Delphi without any performance loss.

  • Question 49:

    Which of the following is a primary service of the U.S. Computer Security Incident Response Team (CSIRT)?

    A. CSIRT provides an incident response service to enable a reliable and trusted single point of contact for reporting computer security incidents worldwide.

    B. CSIRT provides a computer security surveillance service to supply a government with important intelligence information on individuals travelling abroad.

    C. CSIRT provides a penetration testing service to support exception reporting on incidents worldwide by individuals and multi-national corporations.

    D. CSIRT provides a vulnerability assessment service to assist law enforcement agencies with profiling an individual's property or company's asset.

  • Question 50:

    An IT security engineer notices that the company's web server is currently being hacked. What should the engineer do next?

    A. Unplug the network connection on the company's web server.

    B. Determine the origin of the attack and launch a counterattack.

    C. Record as much information as possible from the attack.

    D. Perform a system restart on the company's web server.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.