Free EC-Council 312-50V9 Exam Questions (page: 2)

An Intrusion Detection System(IDS) has alerted the network administrator to a possibly malicious sequence of packets went to a Web server in the network's external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file.
What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?

  1. Protocol analyzer
  2. Intrusion Prevention System (IPS)
  3. Vulnerability scanner
  4. Network sniffer

Answer(s): B



Which of the following tools is used to analyze the files produced by several packet-capture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?

  1. Nessus
  2. Tcptraceroute
  3. Tcptrace
  4. OpenVAS

Answer(s): C



You work as a Security Analyst for a retail organization. In securing the company's network, you set up a firewall and an IDS. However, hackers are able to attack the network. After investigating, you discover that your IDS is not configured properly and therefore is unable to trigger alarms when needed. What type of alert is the IDS giving?

  1. False Negative
  2. True Negative
  3. True Positive
  4. False Positive

Answer(s): A



Which of the following is the BEST way to defend against network sniffing?

  1. Using encryption protocols to secure network communications
  2. Restrict Physical Access to Server Rooms hosting Critical Servers
  3. Use Static IP Address
  4. Register all machines MAC Address in a centralized Database

Answer(s): A



Which of the following describes the characteristics of a Boot Sector Virus?

  1. Overwrites the original MBR and only executes the new virus code
  2. Modifies directory table entries so that directory entries point to the virus code instead of the actual program
  3. Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR
  4. Moves the MBR to another location on the RAM and copies itself to the original location of the MBR

Answer(s): C



Which of the following is assured by the use of a hash?

  1. Availability
  2. Confidentiality
  3. Authentication
  4. Integrity

Answer(s): D



When you are collecting information to perform a dataanalysis, Google commands are very useful to find sensitive information and files. These files may contain information about passwords, system functions, or documentation.
What command will help you to search files using Google as a search engine?

  1. site:target.com file:xls username password email
  2. domain: target.com archive:xls username password email
  3. site: target.com filetype:xls username password email
  4. inurl: target.com filename:xls username password email

Answer(s): C



When you return to your desk after a lunch break, you notice a strange email in your inbox. The senders is someone you did business with recently but the subject line has strange characters in it.
What should you do?

  1. Forward the message to your company's security response team and permanently delete the message from your computer.
  2. Delete the email and pretend nothing happened.
  3. Forward the message to your supervisor andask for her opinion on how to handle the situation.
  4. Reply to the sender and ask them for more information about the message contents.

Answer(s): A






Post your Comments and Discuss EC-Council 312-50V9 exam prep with other Community members:

312-50V9 Exam Discussions & Posts