[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil 312-50v9 Dumps with VCE and PDF 31-40

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released 312-50v9
100% Free Download! 100% Pass Guaranteed!

Certified Ethical Hacker Exam V9

Question No: 31

Session splicing is an IDS evasiontechnique in which an attacker delivers data in multiple, smallsized packets to the target computer, making it very difficult for an IDS to detect the attack signatures.

Which tool can used to perform session splicing attacks?

  1. Hydra

  2. Burp

  3. Whisker

  4. Tcpsplice

Answer: C

Question No: 32

To maintain compliance with regulatory requirements, a security audit of the systems on a network must be performed to determine their compliance with security policies. Which one of the following tools would most likely be used in such as audit?

  1. Port scanner

  2. Protocol analyzer

  3. Vulnerability scanner

  4. Intrusion Detection System

Answer: C

Question No: 33

When you are collecting information to perform a dataanalysis, Google commands are very useful to find sensitive information and files. These files may contain information about passwords, system functions, or documentation.

What command will help you to search files using Google as a search engine?

  1. site:target.com file:xls username password email

  2. domain: target.com archive:xls username password email

  3. site: target.com filetype:xls username password email

  4. inurl: target.com filename:xls username password email

Answer: C

Question No: 34

Which of the following is a design pattern based on distinct pieces ofsoftware providing application functionality as services to other applications?

  1. Lean Coding

  2. Service Oriented Architecture

  3. Object Oriented Architecture

  4. Agile Process

Answer: B

Question No: 35

You just set up a security system in your network. In what kind of system would you find thefollowing string of characters used as a rule within its configuration?

alert tcp any any -gt; 21 (msg: quot;FTP on the network!quot;;)

  1. A firewall IPTable

  2. A Router IPTable

  3. An Intrusion Detection System

  4. FTP Server rule

Answer: C

Question No: 36

Which of the followingis the least-likely physical characteristic to be used in biometric control that supports a large company?

  1. Iris patterns

  2. Voice

  3. Fingerprints

  4. Height and Weight

Answer: D

Question No: 37

What is the process of logging, recording, and resolving events that take place in an organization?

  1. Metrics

  2. Security Policy

  3. Internal Procedure

  4. Incident Management Process

Answer: D

Question No: 38

Which of the following is an extremelycommon IDS evasion technique in the web world?

  1. post knocking

  2. subnetting

  3. unicode characters

  4. spyware

Answer: C

Question No: 39

Jesse receives an email with an attachment labeled “Court_Notice_21206.zip”. Inside the zip file is a file named “Court_Notice_21206.docx.exe” disguised as a word document.Upon execution, a windows appears stating, “This word document is corrupt.” In the background, the file copies itself to Jesse APPDATA\local directory and begins to beacon to a C2 server to download additional malicious binaries. What type of malware has Jesse encountered?

  1. Trojan

  2. Worm

  3. Key-Logger

  4. Micro Virus

Answer: A

Question No: 40

It isan entity or event with the potential to adversely impact a system through unauthorized access destruction disclosures denial of service or modification of data.

Which of the following terms best matches this definition?

  1. Threat

  2. Attack

  3. Risk

  4. Vulnerability

Answer: A

100% Ensurepass Free Download!
Download Free Demo:312-50v9 Demo PDF
100% Ensurepass Free Guaranteed!
312-50v9 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No