Exam Details

  • Exam Code
    :312-50V11
  • Exam Name
    :Certified Ethical Hacker v11 Exam
  • Certification
    :CEH v11
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :528 Q&As
  • Last Updated
    :May 12, 2024

EC-COUNCIL CEH v11 312-50V11 Questions & Answers

  • Question 11:

    Which of the following is the least-likely physical characteristic to be used in biometric control that supports a large company?

    A. Iris patterns

    B. Voice

    C. Height and Weight

    D. Fingerprints

  • Question 12:

    Richard, an attacker, aimed to hack loT devices connected to a target network. In this process. Richard recorded the frequency required to share information between connected devices. After obtaining the frequency, he captured the original data when commands were initiated by the connected devices. Once the original data were collected, he used free tools such as URH to segregate the command sequence. Subsequently, he started injecting the segregated command sequence on the same frequency into the loT network, which repeats the captured signals of the devices. What Is the type of attack performed by Richard In the above scenario?

    A. Side-channel attack

    B. Replay attack

    C. CrypTanalysis attack

    D. Reconnaissance attack

  • Question 13:

    Which of these is capable of searching for and locating rogue access points?

    A. HIDS

    B. WISS

    C. WIPS

    D. NIDS

  • Question 14:

    Abel, a cloud architect, uses container technology to deploy applications/software including all its dependencies, such as libraries and configuration files, binaries, and other resources that run independently from other processes in the cloud environment. For the containerization of applications, he follows the five-tier container technology architecture. Currently. Abel is verifying and validating image contents, signing images, and sending them to the registries. Which of the following tiers of the container technology architecture Is Abel currently working in?

    A. Tier-1: Developer machines

    B. Tier-4: Orchestrators

    C. Tier-3: Registries

    D. Tier-2: Testing and accreditation systems

  • Question 15:

    BitLocker encryption has been implemented for all the Windows-based computers in an organization. You are concerned that someone might lose their cryptographic key. Therefore, a mechanism was implemented to recover the keys from Active Directory. What is this mechanism called in cryptography?

    A. Key archival

    B. Key escrow.

    C. Certificate rollover

    D. Key renewal

  • Question 16:

    What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?

    A. Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.

    B. Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.

    C. Symmetric encryption allows the server to security transmit the session keys out-of- band.

    D. Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.

  • Question 17:

    Which Nmap option would you use if you were not concerned about being detected and wanted to perform a very fast scan?

    A. -T5

    B. -O

    C. -T0

    D. -A

  • Question 18:

    Juliet, a security researcher in an organization, was tasked with checking for the authenticity of images to be used in the organization's magazines. She used these images as a search query and tracked the original source and details of the images, which included photographs, profile pictures, and memes. Which of the following footprinting techniques did Rachel use to finish her task?

    A. Reverse image search

    B. Meta search engines

    C. Advanced image search

    D. Google advanced search

  • Question 19:

    Bella, a security professional working at an it firm, finds that a security breach has occurred while transferring important files. Sensitive data, employee usernames. and passwords are shared In plaintext, paving the way for hackers 10 perform successful session hijacking. To address this situation. Bella Implemented a protocol that sends data using encryption and digital certificates. Which of the following protocols Is used by Bella?

    A. FTP

    B. HTTPS

    C. FTPS

    D. IP

  • Question 20:

    You are trying to break into a highly classified top-secret mainframe computer with highest security system in place at Merclyn Barley Bank located in Los Angeles.

    You know that conventional hacking doesn't work in this case, because organizations such as banks are generally tight and secure when it comes to protecting their systems.

    In other words, you are trying to penetrate an otherwise impenetrable system.

    How would you proceed?

    A. Look for "zero-day" exploits at various underground hacker websites in Russia and China and buy the necessary exploits from these hackers and target the bank's network

    B. Try to hang around the local pubs or restaurants near the bank, get talking to a poorly- paid or disgruntled employee, and offer them money if they'll abuse their access privileges by providing you with sensitive information

    C. Launch DDOS attacks against Merclyn Barley Bank's routers and firewall systems using 100, 000 or more "zombies" and "bots"

    D. Try to conduct Man-in-the-Middle (MiTM) attack and divert the network traffic going to the Merclyn Barley Bank's Webserver to that of your machine using DNS Cache Poisoning techniques

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V11 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.