Exam Details

  • Exam Code
    :312-50V11
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v11)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :528 Q&As
  • Last Updated
    :May 04, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V11 Questions & Answers

  • Question 241:

    An Internet Service Provider (ISP) has a need to authenticate users connecting via analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network.

    Which AAA protocol is the most likely able to handle this requirement?

    A. TACACS+

    B. DIAMETER

    C. Kerberos

    D. RADIUS

  • Question 242:

    DNS cache snooping is a process of determining if the specified resource address is present in the DNS cache records. It may be useful during the examination of the network to determine what software update resources are used, thus discovering what software is installed.

    What command is used to determine if the entry is present in DNS cache?

    A. nslookup -fullrecursive update.antivirus.com

    B. dnsnooping -rt update.antivirus.com

    C. nslookup -norecursive update.antivirus.com

    D. dns --snoop update.antivirus.com

  • Question 243:

    Null sessions are un-authenticated connections (not using a username or password.) to an NT or 2000 system. Which TCP and UDP ports must you filter to check null sessions on your network?

    A. 137 and 139

    B. 137 and 443

    C. 139 and 443

    D. 139 and 445

  • Question 244:

    What is a "Collision attack" in cryptography?

    A. Collision attacks try to get the public key

    B. Collision attacks try to break the hash into three parts to get the plaintext value

    C. Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key

    D. Collision attacks try to find two inputs producing the same hash

  • Question 245:

    Lewis, a professional hacker, targeted the loT cameras and devices used by a target venture-capital firm.

    He used an information-gathering tool to collect information about the loT devices connected to a network, open ports and services, and the attack surface area. Using this tool, he also generated statistical reports on broad usage patterns and trends. This tool helped Lewis continually monitor every reachable server and device on the Internet, further allowing him to exploit these devices in the network. Which of the following tools was employed by Lewis in the above scenario?

    A. Censys

    B. Wapiti

    C. NeuVector

    D. Lacework

  • Question 246:

    Kevin, an encryption specialist, implemented a technique that enhances the security of keys used for encryption and authentication. Using this technique, Kevin input an initial key to an algorithm that generated an enhanced key that is resistant to brute-force attacks. What is the technique employed by Kevin to improve the security of encryption keys?

    A. Key derivation function

    B. Key reinstallation

    C. A Public key infrastructure

    D. Key stretching

  • Question 247:

    What kind of detection techniques is being used in antivirus software that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it's made on the provider's environment?

    A. Behavioral based

    B. Heuristics based

    C. Honeypot based

    D. Cloud based

  • Question 248:

    While testing a web application in development, you notice that the web server does not properly ignore the "dot dot slash" (../) character string and instead returns the file listing of a folder structure of the server.

    What kind of attack is possible in this scenario?

    A. Cross-site scripting

    B. Denial of service

    C. SQL injection

    D. Directory traversal

  • Question 249:

    Geena, a cloud architect, uses a master component in the Kubernetes cluster architecture that scans newly generated pods and allocates a node to them. This component can also assign nodes based on factors such as the overall resource requirement, data locality, software/hardware/policy restrictions, and internal workload interventions.

    Which of the following master components is explained in the above scenario?

    A. Kube-controller-manager

    B. Kube-scheduler

    C. Kube-apiserver

    D. Etcd cluster

  • Question 250:

    David is a security professional working in an organization, and he is implementing a vulnerability management program in the organization to evaluate and control the risks and vulnerabilities in its IT infrastructure. He is currently executing the process of applying fixes on vulnerable systems to reduce the impact and severity of vulnerabilities. Which phase of the vulnerability-management life cycle is David currently in?

    A. verification

    B. Risk assessment

    C. Vulnerability scan

    D. Remediation

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V11 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.