Eccouncil 312-50V9 Exam Questions

Questions for the 312-50V9 were updated on : Dec 01 ,2025

Page 1 out of 9. Viewing questions 1-15 out of 125

Question 1

Initiating an attack against targeted businesses and organizations, threat actors compromise a
carefully selected website by inserting an exploit resulting in malware infection. The attackers run
exploits on well-known and trusted sites likely to be visited by their targeted victims. Aside from
carefully choosing sites to compromise, these attacks are known to incorporate zero-day exploits that
target unpatched vulnerabilities. Thus, the targeted entities are left with little or no defense against
these exploits.
What type of attack is outlined in the scenario?

  • A. Watering Hole Attack
  • B. Spear Phising Attack
  • C. Heartbleed Attack
  • D. Shellshock Attack
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

You have several plain-text firewall logs that you must review to evaluate network traffic. You know
that in order to do this fast and efficiently you must user regular expressions.
Which command-line utility are you most likely to use?

  • A. Notepad
  • B. MS Excel
  • C. Grep
  • D. Relational Database
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

A new wireless client is configured to join a 802.11 network. This client uses the same hardware and
software as many of the other clients on the network. The client can see the network, but cannot
connect. A wireless packet sniffer shows that the Wireless Access Point (WAP) is not responding to
the association requests being sent by the wireless client.
What is a possible source of this problem?

  • A. The client cannot see the SSID of the wireless network
  • B. The wireless client is not configured to use DHCP
  • C. The WAP does not recognize the client's MAC address
  • D. Client is configured for the wrong channel
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

During a recent security assessment, you discover the organization has one Domain Name Server
(DNS) in a Demilitarized Zone (DMZ) and a second DNS server on the internal Network.
What is this type of DNS configuration commonly called?

  • A. DNS Scheme
  • B. DynDNS
  • C. Split DNS
  • D. DNSSEC
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has
snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn
scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort.
You decide to run wireshark in the snort machine to check if the messages are going to the kiwi
syslog machine.
What wireshark filter will show the connections from the snort machine to kiwi syslog machine?

  • A. tcp.dstport==514 && ip.dst==192.168.0.150
  • B. tcp.dstport==514 && ip.dst==192.168.0.99
  • C. tcp.srcport==514 && ip.src==192.168.0.99
  • D. tcp.srcport==514 && ip.src==192.168.150
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Nation-state threat actors often discover vulnerabilities and hold on to them until they want to
launch a sophisticated attack. The Stuxnet attack was an unprecedented style of attack because it
used four types of this vulnerability.
What is this style of attack called?

  • A. zero-hour
  • B. no-day
  • C. zero-day
  • D. zero-sum
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

The “Gray box testing” methodology enforces what kind of restriction?

  • A. Only the external operation of a system is accessible to the tester.
  • B. Only the internal operation of a system is known to the tester.
  • C. The internal operation of a system is completely known to the tester.
  • D. The internal operation of a system is only partly accessible to the tester.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

What term describes the amount of risk that remains after the vulnerabilities are classified and the
countermeasures have been deployed?

  • A. Inherent Risk
  • B. Residual Risk
  • C. Deferred Risk
  • D. Impact Risk
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Which of the following incident handling process phases is responsible for defining rules, creating a
back-up plan, and testing the plans for an enterprise?

  • A. Preparation phase
  • B. Recovery phase
  • C. Identification phase
  • D. Containment phase
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

You are attempting to man-in-the-middle a session. Which protocol will allow you to guess a
sequence number?

  • A. ICMP
  • B. TCP
  • C. UDP
  • D. UPX
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Which of the following is a command line packet analyzer similar to GUI-based Wireshark?

  • A. Jack the ripper
  • B. nessus
  • C. tcpdump
  • D. ethereal
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

You are performing a penetration test. You achieved access via a buffer overflow exploit and you
proceed to find interesting data, such as files with usernames and passwords. You find a hidden
folder that has the administrator’s bank account password and login information for the
administrator’s bitcoin account.
What should you do?

  • A. Do not transfer the money but steal the bitcoins.
  • B. Report immediately to the administrator.
  • C. Transfer money from the administrator’s account to another account.
  • D. Do not report it and continue the penetration test.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

An attacker gains access to a Web server’s database and display the contents of the table that holds
all of the names, passwords, and other user information. The attacker did this by entering
information into the Web site's user login page that the software's designers did not expect to be
entered. This is an example of what kind of software design problem?

  • A. Insufficient security management
  • B. Insufficient database hardening
  • C. Insufficient exception handling
  • D. Insufficient input validation
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

You have successfully gained access to a linux server and would like to ensure that the succeeding
outgoing traffic from the server will not be caught by a Network Based Intrusion Detection System
(NIDS).
Which is the best way to evade the NIDS?

  • A. Out of band signaling
  • B. Encryption
  • C. Alternate Data Streams
  • D. Protocol Isolation
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

Ricardo wants to send secret messages to a competitor company. To secure these messages, he uses
a technique of hiding a secret message within an ordinary message, the technique provides 'security
through obscurity'. What technique is Ricardo using?

  • A. RSA algorithm
  • B. Steganography
  • C. Encryption
  • D. Public-key cryptography
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2