[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil 312-50v9 Dumps with VCE and PDF 51-60
Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released 312-50v9
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/312-50v9.html
Certified Ethical Hacker Exam V9
Question No: 51
While performing online banking using a web browser, a user receives an email that contains alink to an interesting Web site. When the user clicks on the link, another web browser session starts and displays a video of cats playing a piano. The next business day, the user receives what looks like an email from his bank, indicating that his bank account has been accessed from a foreign country. The email asks the user to call his bank and verify the authorization of a funds transfer that took place.
What web browser-based security vulnerability was exploited to compromise the user?
-
Cross-Site Request Forgery
-
Cross-Site Scripting
-
Web form input validation
-
Clickjacking
Answer: A
Question No: 52
It is a kind of malware (malicious software) that criminals install on your computer so they can lock it from a remote location. This malware generates a pop-up windows, webpage,or email warning from what looks like an officialauthority. It explains your computer has been locked because of possible illegal activities and demands payment before you can access your files and programs again.
Which term best matches this definition?
-
Spyware
-
Adware
-
Ransomware
-
Riskware
Answer: C
Question No: 53
An Internet Service Provider (ISP) has a need to authenticate users connecting using analog modems, digital Subscriber Line (DSL), wireless data services, and virtual Private Networks (VPN) over a Frame Relay network.
Which AAA protocol is most likely able to handle this requirement?
-
DIAMETER
-
Kerberos
-
RADIUS
-
TACACS
Answer: D
Question No: 54
What is the most common method to exploit the “Bash Bug” or ShellShock” vulnerability?
-
SSH
-
SYN Flood
-
Manipulate format strings in text fields
-
Through Web servers utilizing CGI (CommonGateway Interface) to send a malformed environment variable to a vulnerable Web server
Answer: D
Question No: 55
PGP, SSL, and IKE are all examples of which type of cryptography?
-
Hash Algorithm
-
Secret Key
-
Public Key
-
Digest
Answer: C
Question No: 56
Which of the following tools can be used for passiveOS fingerprinting?
-
tcpdump
-
ping
-
nmap
-
Tracert
Answer: C
Question No: 57
The chance of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from the last backup to the new hard
disk. The recovery person earns $10/hour. Calculate theSLE, ARO, and ALE. Assume the EF = 1 (100%).
What is the closest approximate cost of this replacement and recovery operation per year?
A. $100 B. $146 C. 440
D. 1320
Answer: B
Question No: 58
The security concept of “separation of duties” is most similar to the operation ofwhich type of security device?
-
Bastion host
-
Honeypot
-
Firewall
-
Intrusion Detection System
Answer: C
Question No: 59
You are performing information gathering for an important penetration test. You have found pdf, doc, and images in your objective. You decide to extract metadata from these files and analyze it.
What tool will help you with the task?
-
Armitage
-
Dimitry
-
cdpsnarf
-
Metagoofil
Answer: D
Question No: 60
The heartland bug was discovered in 2014 and is widely referred to under MITRE’s Common Vulnerabilities and Exposures (CVE) as CVE-2004-1060. Thisbug affects the OpenSSL implementation of the transport Layer security (TLS) protocols defined in RFC6520.
What types of key does this bug leave exposed to the Internet making exploitation of any compromised system very easy?
-
Root
-
Private
-
Shared
-
Public
Answer: A
100% Ensurepass Free Download!
–Download Free Demo:312-50v9 Demo PDF
100% Ensurepass Free Guaranteed!
–312-50v9 Dumps
EnsurePass | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |
100-105 Dumps VCE PDF
200-105 Dumps VCE PDF
300-101 Dumps VCE PDF
300-115 Dumps VCE PDF
300-135 Dumps VCE PDF
300-320 Dumps VCE PDF
400-101 Dumps VCE PDF
640-911 Dumps VCE PDF
640-916 Dumps VCE PDF
70-410 Dumps VCE PDF
70-411 Dumps VCE PDF
70-412 Dumps VCE PDF
70-413 Dumps VCE PDF
70-414 Dumps VCE PDF
70-417 Dumps VCE PDF
70-461 Dumps VCE PDF
70-462 Dumps VCE PDF
70-463 Dumps VCE PDF
70-464 Dumps VCE PDF
70-465 Dumps VCE PDF
70-480 Dumps VCE PDF
70-483 Dumps VCE PDF
70-486 Dumps VCE PDF
70-487 Dumps VCE PDF
220-901 Dumps VCE PDF
220-902 Dumps VCE PDF
N10-006 Dumps VCE PDF
SY0-401 Dumps VCE PDF