[Free] 2018(Jan) EnsurePass Testking ECCouncil 312-50v9 Dumps with VCE and PDF 71-80

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released 312-50v9
100% Free Download! 100% Pass Guaranteed!

Certified Ethical Hacker Exam V9

Question No: 71

What isa “Collision attach” in cryptography?

  1. Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key.

  2. Collision attacks try to break the hash into three parts to get the plaintext value.

  3. Collision attacks try to find two inputs producing the same hash.

  4. Collision attacks try to get the public key

Answer: C

Question No: 72

You are a Network Security Officer. You have two machines. The first machine ( has snort installed, and the second machine ( has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine.

What wireshark filter will show the connections from the snort machineto kiwi syslog machine?

A. tcp.dstport==514 amp;amp; ip.dst== B. tcp.dstport==514 amp;amp;ip.dst== C. tcp.srcport==514 amp;amp; ip.src== D. tcp.srcport==514 amp;amp; ip.src==192.168.150

Answer: A

Question No: 73

The network administrator contacts you and tells you that she noticed the temperature on the internal wireless router increases by more than 20% during weekend hours when the office was closed. She asks you to investigate the issue because she is busy dealing with a big conference and she doesn’t have time to perform the task.

What tool can you use to view the network traffic being sent and received by the wireless router?

  1. Netcat

  2. Wireshark

  3. Nessus

  4. Netstat

Answer: B

Question No: 74

Which of the following isthe greatest threat posed by backups?

  1. An un-encrypted backup can be misplaced or stolen

  2. A back is incomplete because no verification was performed.

  3. A backup is the source of Malware or illicit information.

  4. A backup is unavailable duringdisaster recovery.

Answer: A

Question No: 75

You have successfully gained access to your client’s internal network and successfully comprised a linux server which is part of the internal IP network. You want to know which Microsoft Windows workstation have the sharing enabled.

Which port would you see listeningon these Windows machines in the network?

A. 1443

B. 3389

C. 161

D. 445

Answer: D

Question No: 76

Which of the following is considered the best way to prevent Personally Identifiable Information (PII) from web application vulnerabilities?

  1. Use encrypted communications protocols to transmit PII

  2. Use full disk encryption on all hard drives to protect PII

  3. Use cryptographic storage to store all PII

  4. Use a security token to log onto into all Web application that use PII

Answer: A

Question No: 77

Under the “Post-attach Phase and Activities,” it is the responsibility of the tester to restore the system to a pre-test state.

Which of the following activities should not be included in this phase? I.Removing all files uploaded on the system

II.Cleaning all registry entries III.Mapping of network state

IV.Removing all tools and maintaining backdoor for reporting

  1. III

  2. IV

  3. III and IV

  4. All should be included.

Answer: A

Question No: 78

Which of the following is not a Bluetooth attack?

  1. Bluejacking

  2. Bluedriving

  3. Bluesnarfing

  4. Bluesmaking

Answer: B

Question No: 79

Risk = Threats x Vulnerabilities is referred to as the:

  1. Threat assessment

  2. Disaster recovery formula

  3. BIA equation

  4. Risk equation

Answer: D

Question No: 80

When you return to your desk after a lunch break, you notice a strange email in your inbox. The senders is someone you did business with recently but the subject line has strange characters in it.

What should you do?

  1. Forward the message to your company’s security response team and permanently delete the message from your computer.

  2. Delete the email and pretend nothing happened.

  3. Forward the message to your supervisor andask for her opinion on how to handle the situation.

  4. Reply to the sender and ask them for more information about the message contents.

Answer: A

100% Ensurepass Free Download!
Download Free Demo:312-50v9 Demo PDF
100% Ensurepass Free Guaranteed!
312-50v9 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.