ECCouncil 312-50v9 - Certified Ethical Hacker Exam V9 Exam

Question #1 (Topic: )
You have successfully gained access to a linux server and would like to ensure that the
succeeding outgoing traffic from the server will not be caught by a Network Based Intrusion
Detection System (NIDS).
Which is the best way to evade the NIDS?
A. Out of band signaling B. Encryption C. Alternate Data Streams D. Protocol Isolation
Answer: B
Question #2 (Topic: )
Which of the following incident handling process phases is responsible for defining rules,
creating a back-up plan, and testing the plans for an enterprise?
A. Preparation phase B. Recovery phase C. Identification phase D. Containment phase
Answer: A
Question #3 (Topic: )
The purpose of a ____________ is to deny network access to local area networks and
other information assets by unauthorized wireless devices.
A. Wireless Access Point B. Wireless Analyzer C. Wireless Access Control list D. Wireless Intrusion Prevention System
Answer: D
Question #4 (Topic: )
Your company was hired by a small healthcare provider to perform a technical assessment
on the network.
What is the best approach for discovering vulnerabilities on a Windows-based computer?
A. Use the built-in Windows Update tool B. Create a disk imageof a clean Windows installation C. Check MITRE.org for the latest list of CVE findings D. Used a scan tool like Nessus
Answer: D
Question #5 (Topic: )
Jimmy is standing outside a secure entrance to a facility. He is pretending to having a
tense conversation on his cell phone as an authorized employee badges in. Jimmy, while
still on the phone, grabs the door as it beginsto close.
What just happened?
A. Masquading B. Phishing C. Whaling D. Piggybacking
Answer: D
Download Exam
Page: 1 / 25
Total 125 questions