EC-Council 312-50V9 Exam Questions
Certified Ethical Hacker Exam V9 (Page 4 )

Updated On: 16-Feb-2026

Under the "Post-attach Phase and Activities, " it is the responsibility of the tester to restore the system to a pre-test state.
Which of the following activities should not be included in this phase?

I). Removing all files uploaded on the system
II). Cleaning all registry entries
III). Mapping of network state
IV). Removing all tools and maintaining backdoor for reporting

  1. III
  2. IV
  3. III and IV
  4. All should be included.

Answer(s): A



Which of the following is a low-tech way of gaining unauthorized access to systems?

  1. Sniffing
  2. Social engineering
  3. Scanning
  4. Eavesdropping

Answer(s): B



Which of the following statements regarding ethical hacking is incorrect?

  1. Testing should be remotely performed offsite.
  2. Ethical hackers should never use tools that have potential of exploiting vulnerabilities in the
    organizations IT system.
  3. Ethical hacking should not involve writing to or modifying the target systems.
  4. An organization should use ethical hackers who do not sell hardware/software or other consulting services.

Answer(s): B



Session splicing is an IDS evasiontechnique in which an attacker delivers data in multiple, smallsized packets to the target computer, making it very difficult for an IDS to detect the attack signatures.
Which tool can used to perform session splicing attacks?

  1. Hydra
  2. Burp
  3. Whisker
  4. Tcpsplice

Answer(s): C



You have compromised a server on a network and successfully open a shell. You aimed to identify all operating systems running on the network. However, as you attemptto fingerprint all machines in the machines in the network using the nmap syntax below, it is not going through.
invictus@victim_server:~$nmap ­T4 ­O 10.10.0.0/24
TCP/IP fingerprinting (for OS scan) xxxxxxx xxxxxx xxxxxxxxxx.
QUITTING!
What seems to be wrong?

  1. The outgoing TCP/IP fingerprinting is blocked by the host firewall.
  2. This is a common behavior for a corrupted nmap application.
  3. OS Scan requires root privileged.
  4. The nmap syntax is wrong.

Answer(s): D






Post your Comments and Discuss EC-Council 312-50V9 exam dumps with other Community members:

Join the 312-50V9 Discussion