PrepAway - Latest Free Exam Questions & Answers

Category: 312-50v9

Exam 312-50v9: Certified Ethical Hacker

What tool can you use to view the network traffic being…

The network administrator contacts you and tells you that she noticed the temperature on the internal wireless
router increases by more than 20% during weekend hours when the office was closed. She asks you to
investigate the issue because she is busy dealing with a big conference and she doesn’t have time to perform
the task.
What tool can you use to view the network traffic being sent and received by the wireless router?

Which of the following vulnerabilities is being described?

It is a vulnerability in GNU’s bash shell, discovered in September of 2014, that gives attackers access to run
remote commands on a vulnerable system. The malicious software can take control of an infected machine,
launch denial-of-service attacks to disrupt websites, and scan for other vulnerable devices (including routers).
Which of the following vulnerabilities is being described?

What is this type of attack (that can use either HTTP G…

An attacker changes the profile information of a particular user (victim) on the target website. The attacker uses
this string to update the victim’s profile to a text file and then submit the data to the attacker’s database.
<iframe src=”http://www.vulnweb.com/updateif.php” style=”display:none”></iframe>
What is this type of attack (that can use either HTTP GET or HTTP POST) called?

Which of the following regulations best matches the des…

It is a regulation that has a set of guidelines, which should be adhered to by anyone who handles any electronic
medical data. These guidelines stipulate that all medical practices must ensure that all necessary measures are
in place while saving, accessing, and sharing any electronic medical data to keep patient data secure.
Which of the following regulations best matches the description?


Page 25 of 51« First...1020...2324252627...304050...Last »