Eccouncil 312-50v9 practice test

Certified Ethical Hacker V9

Last exam update: Nov 18 ,2025
Page 1 out of 9. Viewing questions 1-15 out of 125

Question 1

The configuration allows a wired or wireless network interface controller to pass all trafice it receives
to the central processing unit (CPU), rather than passing only the frames that the controller is
intended to receive.
Which of the following is being described?

  • A. WEM
  • B. Multi-cast mode
  • C. Promiscuous mode
  • D. Port forwarding
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

In Risk Management, how is the term “likelihood” related to the concept of “threat?”

  • A. Likelihood is the probability that a vulnerability is a threat-source.
  • B. Likelihood is a possible threat-source that may exploit a vulnerability.
  • C. Likelihood is the likely source of a threat that could exploit a vulnerability.
  • D. Likelihood is the probability that a threat-source will exploit a vulnerability.
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

While performing online banking using a web browser, a user receives an email that contains a link
to an interesting Web site. When the user clicks on the link, another web browser session starts and
displays a video of cats playing a piano. The next business day, the user receives what looks like an
email from his bank, indicating that his bank account has been accessed from a foreign country. The
email asks the user to call his bank and verify the authorization of a funds transfer that took place.
What web browser-based security vulnerability was exploited to compromise the user?

  • A. Cross-Site Request Forgery
  • B. Cross-Site Scripting
  • C. Web form input validation
  • D. Clickjacking
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Which of the following is one of the most effective ways to prevent Cross-site Scripting (XSS) flaws in
software applications?

  • A. Verity access right before allowing access to protected information and UI controls
  • B. Use security policies and procedures to define and implement proper security settings
  • C. Validate and escape all information sent over to a server
  • D. Use digital certificates to authenticate a server prior to sending data
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

An incident investigator asks to receive a copy of the event from all firewalls, prosy servers, and
Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible
breach of security. When the investigator attempts to correlate the information in all of the logs the
sequence of many of the logged events do not match up.
What is the most likely cause?

  • A. The network devices are not all synchronized
  • B. The security breach was a false positive.
  • C. The attack altered or erased events from the logs.
  • D. Proper chain of custody was not observed while collecting the logs.
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

This tool is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough
data packets have been captured. It implements the standard FMS attach along with some
optimizations like Korek attacks, as well as the PTW attack, thus making the attack much faster
compared to other WEP cracking tools.
Which of the following tools is being described?

  • A. Wificracker
  • B. WLAN-crack
  • C. Airguard
  • D. Aircrack-ng
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

Which of the following tools is used to analyze the files produced by several packet-capture programs
such as tcpdump, WinDump, Wireshark, and EtherPeek?

  • A. Nessus
  • B. Tcptraceroute
  • C. Tcptrace
  • D. OpenVAS
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

You have compromised a server on a network and successfully open a shell. You aimed to identify all
operating systems running on the network. However, as you attempt to fingerprint all machines in
the machines in the network using the nmap syntax below, it is not going through.
invictus@victim_server:~$nmap –T4 –O 10.10.0.0/24
TCP/IP fingerprinting (for OS scan) xxxxxxx xxxxxx xxxxxxxxxx.
QUITTING!
What seems to be wrong?

  • A. The outgoing TCP/IP fingerprinting is blocked by the host firewall.
  • B. This is a common behavior for a corrupted nmap application.
  • C. OS Scan requires root privileged.
  • D. The nmap syntax is wrong.
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Which of the following is the greatest threat posed by backups?

  • A. An un-encrypted backup can be misplaced or stolen
  • B. A back is incomplete because no verification was performed.
  • C. A backup is the source of Malware or illicit information.
  • D. A backup is unavailable during disaster recovery.
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to
go to
www.MyPersonalBank.com
, that the user is directed to a phishing site.
Which file does the attacker need to modify?

  • A. Hosts
  • B. Networks
  • C. Boot.ini
  • D. Sudoers
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Jesse receives an email with an attachment labeled “Court_Notice_21206.zip”. Inside the zip file is a
file named “Court_Notice_21206.docx.exe” disguised as a word document. Upon execution, a
windows appears stating, “This word document is corrupt.” In the background, the file copies itself to
Jesse APPDATA\local directory and begins to beacon to a C2 server to download additional malicious
binaries. What type of malware has Jesse encountered?

  • A. Trojan
  • B. Worm
  • C. Key-Logger
  • D. Micro Virus
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering
the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data
theft through a technique known wardriving.
Which algorithm is this referring to?

  • A. Wired Equivalent Privacy (WEP)
  • B. Temporal Key Integrity Protocol (TRIP)
  • C. Wi-Fi Protected Access (WPA)
  • D. Wi-Fi Protected Access 2 (WPA2) E.
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

What is the best description of SQL Injection?

  • A. It is a Denial of Service Attack.
  • B. It is an attack used to modify code in an application.
  • C. It is and attack used to gain unauthorized access to a database.
  • D. It is a Man-in-the-Middle attack between your SQL Server and Web App Server.
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which of the following is the successor of SSL?

  • A. RSA
  • B. GRE
  • C. TLS
  • D. IPSec
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

As a Certified Ethical hacker, you were contracted by a private firm to conduct an external security
assessment through penetration testing.
What document describes the specified of the testing, the associated violations, and essentially
protects both the organization’s interest and your li abilities as a tester?

  • A. Term of Engagement
  • B. Non-Disclosure Agreement
  • C. Project Scope
  • D. Service Level Agreement
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2