EC-Council 312-50V9 Exam Questions
Certified Ethical Hacker Exam V9 (Page 3 )

Updated On: 16-Feb-2026

You've gained physical access to a Windows 2008 R2 server which has as accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your tool kit you have an Ubuntu 9.10 Linux LiveCD.Which Linux tool has the ability to change any user's password or to activate disabled Windows Accounts?

  1. John the Ripper
  2. CHNTPW
  3. Cain & Abel
  4. SET

Answer(s): A



A company's Web development team has become aware ofa certain type of security vulnerability in their Web software. To mitigate the possibility of this vulnerability being exploited, the team wants to modify the software requirements to disallow users from entering HTML as input into their Web application.
What kind of web application vulnerability likely exists in their software?

  1. Web site defacement vulnerability
  2. SQL injection vulnerability
  3. Cross-site Scripting vulnerability
  4. Cross-site Request Forgery vulnerability

Answer(s): C



The purpose of a ____________ is to deny network access to local area networks and other information assets by unauthorized wireless devices.

  1. Wireless Access Point
  2. Wireless Analyzer
  3. Wireless Access Control list
  4. Wireless Intrusion Prevention System

Answer(s): D



You are performing information gathering for an important penetration test. You have found pdf, doc, and images in your objective. You decide to extract metadata from these files and analyze it.
What tool will help you with the task?

  1. Armitage
  2. Dimitry
  3. cdpsnarf
  4. Metagoofil

Answer(s): D



A Regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server.
Based on this information, what should be one of your key recommendations to the bank?

  1. Move the financial data to another server on the same IP subnet
  2. Place a front-end web server in a demilitarized zone that only handles external web traffic
  3. Issue new certificates to the web servers from the root certificate authority
  4. Require all employees to change their passwords immediately

Answer(s): A






Post your Comments and Discuss EC-Council 312-50V9 exam dumps with other Community members:

Join the 312-50V9 Discussion