312-50v9 Exam - EC-Council Certified Ethical Hacker v9

certleader.com

Q1. A common cryptographically tool is the use of XOR. XOR the following binary value: 10110001

00111010

A. 10001011

B. 10011101

C. 11011000

D. 10111100

Answer: A

Q2. You are tasked to perform a penetration test. While you are performinginformation gathering, you find ab employee list in Google. You find receptionist’s email, and you send her an email changing the source email to her boss’s email ( boss@company ). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with links. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don’t work. She reads your email, opens the links, and her machine gets infected.

What testing method did you use?

A. Piggybacking

B. Tailgating

C. Evesdropping

D. Social engineering

Answer: D

Q3. Which of the following statements regarding ethical hacking is incorrect?

A. Testing should be remotely performed offsite.

B. Ethical hackers should never use tools that have potential of exploiting vulnerabilities in the

organizations IT system.

C. Ethical hacking should not involve writing to or modifying the target systems.

D. An organization should use ethical hackers who do not sell hardware/software or other consulting services.

Answer: B

Q4. You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly.

What is the best nmap command you will use?

A. Nmap –T4 –F 10.10.0.0/24 

B. Nmap –T4 –q 10.10.0.0/24 

C. Nmap –T4 –O 10.10.0.0/24 

D. Nmap –T4 –r 10.10.0.0/24

Answer: A

Q5. You have compromised a server on a network and successfully open a shell. You aimed to identify all operating systems running on the network. However, as you attemptto fingerprint all machines in the machines in the network using the nmap syntax below, it is not going through.

invictus@victim_server:~$nmap –T4 –O 10.10.0.0/24

TCP/IP fingerprinting (for OS scan) xxxxxxx xxxxxx xxxxxxxxxx. QUITTING!

What seems to be wrong?

A. The outgoing TCP/IP fingerprinting is blocked by the host firewall.

B. This is a common behavior for a corrupted nmap application.

C. OS Scan requires root privileged.

D. The nmap syntax is wrong.

Answer: D

Q6. In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known wardriving.

Which algorithm is this referring to?

A. Wired Equivalent Privacy (WEP)

B. Temporal Key Integrity Protocol (TRIP)

C. Wi-Fi Protected Access (WPA)

D. Wi-Fi Protected Access 2(WPA2)

Answer: A

Q7. It is a regulation that has a set if guideline,which should be adhered to by anyone who handles any electronic medical data. These guidelines stipulate that all medical practices must ensure that all necessary measures are in place while saving, accessing, and sharing any electronic medical data to keep patient data secure.

Which of the following regulations best matches the description?

A. HIPAA

B. COBIT

C. ISO/IEC 27002

D. FISMA

Answer: A

Q8. The “Gray box testing” methodology enforces what kind of restriction?

A. Only the external operation of a system is accessible to the tester.

B. Only the internal operation of a system is known to the tester.

C. The internal operation of a system is completely known to the tester.

D. The internal operation of a system is only partly accessible to the tester.

Answer: D

Q9. What does a firewall check to prevent particularports and applications from getting packets into an organizations?

A. Transport layer port numbers and application layer headers

B. Network layer headers and the session layer port numbers

C. Application layer port numbers and the transport layer headers

D. Presentation layer headers and the session layer port numbers

Answer: A

Q10. Which of these options is the most secure procedure for strong backup tapes?

A. In a climate controlled facility offsite

B. Inside the data center for faster retrieval in afireproof safe

C. In a cool dry environment

D. On a different floor in the same building

Answer: A