[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil 312-50v9 Dumps with VCE and PDF 1-10

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released 312-50v9
100% Free Download! 100% Pass Guaranteed!

Certified Ethical Hacker Exam V9

Question No: 1

You have successfully gained access to a linux server and would like to ensure that the succeeding outgoing traffic from the server will not be caught by a Network Based Intrusion Detection System (NIDS).

Which is the best way to evade the NIDS?

  1. Out of band signaling

  2. Encryption

  3. Alternate Data Streams

  4. Protocol Isolation

Answer: B

Question No: 2

Which of the following incident handling process phases is responsible for defining rules, creating a back-up plan, and testing the plans for an enterprise?

  1. Preparation phase

  2. Recovery phase

  3. Identification phase

  4. Containment phase

Answer: A

Question No: 3

The purpose of a is to deny network access to local area networks and other information assets by unauthorized wireless devices.

  1. Wireless Access Point

  2. Wireless Analyzer

  3. Wireless Access Control list

  4. Wireless Intrusion Prevention System

Answer: D

Question No: 4

Your company was hired by a small healthcare provider to perform a technical assessment on the network.

What is the best approach for discovering vulnerabilities on a Windows-based computer?

  1. Use the built-in Windows Update tool

  2. Create a disk imageof a clean Windows installation

  3. Check MITRE.org for the latest list of CVE findings

  4. Used a scan tool like Nessus

Answer: D

Question No: 5

Jimmy is standing outside a secure entrance to a facility. He is pretending to having a tense conversation on his cell phone as an authorized employee badges in. Jimmy, while still on the phone, grabs the door as it beginsto close.

What just happened?

  1. Masquading

  2. Phishing

  3. Whaling

  4. Piggybacking

Answer: D

Question No: 6

Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGI#39;s?

  1. Snort

  2. Dsniff

  3. Nikto

  4. John the Ripper

Answer: C

Question No: 7

This asymmetry cipther is based on factoring the product of two large prime numbers. What cipher is described above?

  1. SHA

  2. RC5

  3. RSA

  4. MD5

Answer: C

Question No: 8

Initiating an attack against targeted businesses and organizations, threat actors compromise a carefully selected website byinserting an exploit resulting in malware infection. The attackers run exploits on well-known and trusted sites likely to be visited by their targeted victims. Aside from carefully choosing sites to compromise, these attacks are known toincorporate zero-day exploits that target unpatched vulnerabilities. Thus, the targeted entities are left with little or no defense against these exploits.

What type of attack is outlined in the scenario?

  1. Watering Hole Attack

  2. Spear Phising Attack

  3. Heartbleed Attack

  4. Shellshock Attack

Answer: A

Question No: 9

Nation-state threat actors often discover vulnerabilitiesand hold on to them until they want to launch a sophisticated attack. The Stuxnet attack was an unprecedented style of attack because it used four types of this vulnerability.

What is this style of attack called?

  1. zero-hour

  2. no-day

  3. zero-day

  4. zero-sum

Answer: C

Question No: 10

A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing inconcluding the Operating System (OS) version installed. Considering the NMAP result below, which of the follow is likely to be installed on the target machine by the OS? Starting NMAP 5.21 at 2011-03-15 11:06 NMAP scan report for Host is up (1.00s latency). Not shown: 993 closed ports PORT STATE SERVICE 21/tcp open ftp 23/tcp open telnet 80 /tcp open http 139/tcp open netbios-ssn 515/tcp open 631/tec open ipp 9100/tcp open MAC Address: 00:00:48:0D:EE:8

  1. The host is likely a printer.

  2. The host is likely a router.

  3. The host is likely a Linux machine.

  4. The host is likely a Windows machine.

Answer: A

100% Ensurepass Free Download!
Download Free Demo:312-50v9 Demo PDF
100% Ensurepass Free Guaranteed!
312-50v9 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No