Free EC-Council 312-50V9 Exam Questions (page: 3)

It is a kind of malware (malicious software) that criminals install on your computer so they can lock it from a remote location. This malware generates a pop-up windows, webpage, or email warning from what looks like an officialauthority. It explains your computer has been locked because of possible illegal activities and demands payment before you can access your files and programs again.
Which term best matches this definition?

  1. Spyware
  2. Adware
  3. Ransomware
  4. Riskware

Answer(s): C



In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known wardriving.
Which algorithm is this referring to?

  1. Wired Equivalent Privacy (WEP)
  2. Temporal Key Integrity Protocol (TRIP)
  3. Wi-Fi Protected Access (WPA)
  4. Wi-Fi Protected Access 2(WPA2)

Answer(s): A



You are usingNMAP to resolve domain names into IP addresses for a ping sweep later.
Which of the following commands looks for IP addresses?

  1. >host ­t ns hackeddomain.com
  2. >host ­t AXFR hackeddomain.com
  3. >host ­t soa hackeddomain.com
  4. >host ­t a hackeddomain.com

Answer(s): D



A common cryptographically tool is the use of XOR. XOR the following binary value:

10110001
00111010

  1. 10001011
  2. 10011101
  3. 11011000
  4. 10111100

Answer(s): A



An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to www.MyPersonalBank.com, that the user is directed to a phishing site.
Which file does the attacker needto modify?

  1. Hosts
  2. Networks
  3. Boot.ini
  4. Sudoers

Answer(s): A



It is a vulnerability in GNU's bash shell, discovered in September of 2004, that gives attackers access to run remote commands on a vulnerable system. The malicious software can take control of an infected machine, launch denial-of service attacks to disrupt websites, and scan for other vulnerable devices (including routers).
Which of the following vulnerabilities is being described?

  1. Shellshock
  2. Rootshock
  3. Shellbash
  4. Rootshell

Answer(s): A



When you are getting informationabout a web server, it is very important to know the HTTP Methods (GET, POST, HEAD, PUT, DELETE, TRACE) that are available because there are two critical methods (PUT and DELETE). PUT can upload a file to the server and DELETE can delete a file from the server. You can detect all these methods (GET, POST, HEAD, PUT, DELETE, TRACE) using NMAP script engine.
What nmap script will help you with this task?

  1. http enum
  2. http-git
  3. http-headers
  4. http-methods

Answer(s): B



Which of the following incident handling process phases is responsible for defining rules, creating a back-up plan, and testing the plans for an enterprise?

  1. Preparation phase
  2. Recovery phase
  3. Identification phase
  4. Containment phase

Answer(s): A






Post your Comments and Discuss EC-Council 312-50V9 exam prep with other Community members:

312-50V9 Exam Discussions & Posts