EnsurePass
2017 Aug ECCouncil Official New Released 312-50v9
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/312-50v9.html

Certified Ethical Hacker Exam V9

Question No: 41

An attacker changes the profile information of a particular user on a target website (the victim). The attacker uses this string to update the victim#39;s profile to a text file and then submit the data to the attacker’s database.

lt;frame src=http://www/vulnweb.com/updataif.php Style=鈥漝isplay:none鈥?gt;lt;/iframegt; What is this type of attack (that can use either HTTP GET or HRRP POST) called?

  1. Cross-Site Request Forgery

  2. Cross-Site Scripting

  3. SQL Injection

  4. Browser Hacking

Answer: A

Question No: 42

After trying multiple exploits, you’ve gained root access to a Centos 6 answer. To ensure you maintain access. What would you do first?

  1. Disable IPTables

  2. Create User Account

  3. Downloadand Install Netcat

  4. Disable Key Services

Answer: C

Question No: 43

Which of the followingtypes of firewalls ensures that the packets are part of the established session?

  1. Switch-level firewall

  2. Stateful inspection firewall

  3. Application-level firewall

  4. Circuit-level firewall

Answer: B

Question No: 44

You are usingNMAP to resolve domain names into IP addresses for a ping sweep later. Which of the following commands looks for IP addresses?

  1. gt;host 鈥搕 ns hackeddomain.com

  2. gt;host 鈥搕 AXFR hackeddomain.com

  3. gt;host 鈥搕 soa hackeddomain.com

  4. gt;host 鈥搕 a hackeddomain.com

Answer: D

Question No: 45

Your company performs penetration tests and security assessments for small and medium- sized business in the local area. During a routine security assessment, you discover information that suggests your client is involved with human trafficking.

What should you do?

  1. Copy the data to removable media and keep it in case you need it.

  2. Ignore the data and continue the assessment until completed as agreed.

  3. Confront theclient on a respectful manner and ask her about the data.

  4. Immediately stop work and contact the proper legal authorities.

Answer: D

Question No: 46

A common cryptographically tool is the use of XOR. XOR the following binary value: 10110001

00111010

A. 10001011

B. 10011101

C. 11011000

D. 10111100

Answer: A

Question No: 47

The 鈥淏lack box testing鈥?methodology enforces which kind of restriction?

  1. Only the external operation of a systemis accessible to the tester

  2. The internal operation of a system is completely known to the tester.

  3. Only the internal operation of a system is known to the tester.

  4. The internal operation of a system is only partly accessible to the tester.

Answer: A

Question No: 48

You are attempting to man-in-the-middle a session. Which protocol will allow you to guess a sequence number?

  1. ICMP

  2. TCP

  3. UDP

  4. UPX

Answer: B

Question No: 49

Ricardo wants to send secret messages to acompetitor company. To secure these messages, he uses a technique of hiding a secret message within an ordinary message, the technique provides #39;security through obscurity#39;. What technique is Ricardo using?

  1. RSA algorithm

  2. Steganography

  3. Encryption

  4. Public-key cryptography

Answer: B

Question No: 50

Which tool allows analysis and pen testers to examine links between data using graphs and link analysis?

  1. Metasploit

  2. Maltego

  3. Wireshark

  4. Cain amp;Abel

Answer: B

100% Free Download!
Download Free Demo:312-50v9 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 312-50v9 Full Exam PDF and VCE
Get 10% off your purchase! Copy it:TJDN-947R-9CCD [2017.07.01-2017.07.31]

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE