EC-Council 312-50V9 Exam Questions
Certified Ethical Hacker Exam V9 (Page 2 )

Updated On: 16-Feb-2026

An Intrusion Detection System(IDS) has alerted the network administrator to a possibly malicious sequence of packets went to a Web server in the network's external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file.
What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?

  1. Protocol analyzer
  2. Intrusion Prevention System (IPS)
  3. Vulnerability scanner
  4. Network sniffer

Answer(s): B



PGP, SSL, and IKE are all examples of which type of cryptography?

  1. Hash Algorithm
  2. Secret Key
  3. Public Key
  4. Digest

Answer(s): C



It isan entity or event with the potential to adversely impact a system through unauthorized access destruction disclosures denial of service or modification of data.
Which of the following terms best matches this definition?

  1. Threat
  2. Attack
  3. Risk
  4. Vulnerability

Answer(s): A



During a blackbox pen test you attempt to pass IRC traffic over post 80/TCP from a compromised web enabled host. The traffic gets blocked; however outbound HTTP traffic is unimpeded.
What type of firewall is inspecting outbound traffic?

  1. Circuit
  2. Packet Filtering
  3. Application
  4. Stateful

Answer(s): C



Which of the following is not a Bluetooth attack?

  1. Bluejacking
  2. Bluedriving
  3. Bluesnarfing
  4. Bluesmaking

Answer(s): B






Post your Comments and Discuss EC-Council 312-50V9 exam dumps with other Community members:

Join the 312-50V9 Discussion