312-50v9 Exam - EC-Council Certified Ethical Hacker v9

certleader.com

Q1. While performing online banking using a web browser, a user receives an email that contains alink to an interesting Web site. When the user clicks on the link, another web browser session starts and displays a video of cats playing a piano. The next business day, the user receives what looks like an email from his bank, indicating that his bank account has been accessed from a foreign country. The email asks the user to call his bank and verify the authorization of a funds transfer that took place.

What web browser-based security vulnerability was exploited to compromise the user?

A. Cross-Site Request Forgery

B. Cross-Site Scripting

C. Web form input validation

D. Clickjacking

Answer: A

Q2. A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing inconcluding the Operating System (OS) version installed. Considering the NMAP result below, which of the follow is likely to be installed on the target machine by the OS? Starting NMAP 5.21 at 2011-03-15 11:06 NMAP scan report

for 172.16.40.65 Host is up (1.00s latency). Not shown: 993 closed ports PORT STATE SERVICE 21/tcp open ftp 23/tcp open telnet 80 /tcp open http 139/tcp open netbios-ssn 515/tcp open 631/tec open ipp 9100/tcp open MAC Address: 00:00:48:0D:EE:8

A. The host is likely a printer.

B. The host is likely a router.

C. The host is likely a Linux machine.

D. The host is likely a Windows machine.

Answer: A

Q3. You have successfully compromised a machine on the network and found a server that is alive on the same network. You tried to ping but you didn’t get any response back.

What is happening?

A. TCP/IP doesn’t support ICMP.

B. ICMP could be disabled on the target server.

C. The ARP is disabled on the target server.

D. You need to run the ping command with root privileges.

Answer: A

Q4. You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine.

What wireshark filter will show the connections from the snort machineto kiwi syslog machine?

A. tcp.dstport==514 && ip.dst==192.168.0.150 B. tcp.dstport==514 &&ip.dst==192.168.0.99 C. tcp.srcport==514 && ip.src==192.168.0.99 D. tcp.srcport==514 && ip.src==192.168.150

Answer: A

Q5. This tool is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attach along with some optimizations like Korek attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools.

Which of the following tools is being described?

A. Wificracker

B. WLAN-crack

C. Airguard

D. Aircrack-ng

Answer: D

Q6. Your company performs penetration tests and security assessments for small and medium-

sized business in the local area. During a routine security assessment, you discover information that suggests your client is involved with human trafficking.

What should you do?

A. Copy the data to removable media and keep it in case you need it.

B. Ignore the data and continue the assessment until completed as agreed.

C. Confront theclient on a respectful manner and ask her about the data.

D. Immediately stop work and contact the proper legal authorities.

Answer: D

Q7. You are the Systems Administrator for a large corporate organization. You need to monitor all network traffic on your local network for suspicious activities and receive notifications when an attack is occurring. Which tool would allow you to accomplish this goal?

A. Host-based IDS

B. Firewall

C. Network-Based IDS

D. Proxy

Answer: C

Q8. Which of the following is a command line packet analyzer similar to GUI-based Wireshark?

A. Jack the ripper

B. nessus

C. tcpdump

D. ethereal

Answer: C

Q9. When you are testing a web application, it is very useful to employ a prosy tool to save every request and response.Nyou can manually test every request and analyze the response to find vulnerabilities. You can test parameter and headers manually to get more precise results than if using web vulnerability scanners.

What proxy tool will help you find web vulnerabilities?

A. Burpsuite

B. Dimitry

C. Proxychains

D. Maskgen

Answer: A

Q10. It is a kind of malware (malicious software) that criminals install on your computer so they can lock it from a remote location. This malware generates a pop-up windows, webpage,or email warning from what looks like an officialauthority. It explains your computer has been locked because of possible illegal activities and demands payment before you can access your files and programs again.

Which term best matches this definition?

A. Spyware

B. Adware

C. Ransomware

D. Riskware

Answer: C