Eccouncil 312-50v9 practice test

Exam Title: Certified Ethical Hacker V9

Last update: Nov 27 ,2025
Question 1

Jesse receives an email with an attachment labeled “Court_Notice_21206.zip”. Inside the zip file is a
file named “Court_Notice_21206.docx.exe” disguised as a word document. Upon execution, a
windows appears stating, “This word document is corrupt.” In the background, the file copies itself to
Jesse APPDATA\local directory and begins to beacon to a C2 server to download additional malicious
binaries. What type of malware has Jesse encountered?

  • A. Trojan
  • B. Worm
  • C. Key-Logger
  • D. Micro Virus
Answer:

A

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering
the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data
theft through a technique known wardriving.
Which algorithm is this referring to?

  • A. Wired Equivalent Privacy (WEP)
  • B. Temporal Key Integrity Protocol (TRIP)
  • C. Wi-Fi Protected Access (WPA)
  • D. Wi-Fi Protected Access 2 (WPA2) E.
Answer:

A

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

What is the best description of SQL Injection?

  • A. It is a Denial of Service Attack.
  • B. It is an attack used to modify code in an application.
  • C. It is and attack used to gain unauthorized access to a database.
  • D. It is a Man-in-the-Middle attack between your SQL Server and Web App Server.
Answer:

D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

Which of the following is the successor of SSL?

  • A. RSA
  • B. GRE
  • C. TLS
  • D. IPSec
Answer:

C

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

As a Certified Ethical hacker, you were contracted by a private firm to conduct an external security
assessment through penetration testing.
What document describes the specified of the testing, the associated violations, and essentially
protects both the organization’s interest and your li abilities as a tester?

  • A. Term of Engagement
  • B. Non-Disclosure Agreement
  • C. Project Scope
  • D. Service Level Agreement
Answer:

B

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

Which of the following is not a Bluetooth attack?

  • A. Bluejacking
  • B. Bluedriving
  • C. Bluesnarfing
  • D. Bluesmaking
Answer:

B

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

PGP, SSL, and IKE are all examples of which type of cryptography?

  • A. Hash Algorithm
  • B. Secret Key
  • C. Public Key
  • D. Digest
Answer:

C

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

Using Windows CMD, how would an attacker list all the shares to which the current user context has
access?

  • A. NET CONFIG
  • B. NET USE
  • C. NET FILE
  • D. NET VIEW
Answer:

D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

Which of these options is the most secure procedure for strong backup tapes?

  • A. In a climate controlled facility offsite
  • B. Inside the data center for faster retrieval in a fireproof safe
  • C. In a cool dry environment
  • D. On a different floor in the same building
Answer:

A

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

What is the benefit of performing an unannounced Penetration Testing?

  • A. The tester will have an actual security posture visibility of the target network.
  • B. The tester could not provide an honest analysis.
  • C. Network security would be in a “best state” posture.
  • D. It is best to catch critical infrastructure unpatched.
Answer:

A

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 12
Viewing questions 1-10 out of 125
Go To
page 2