Exam Details

  • Exam Code
    :312-50V11
  • Exam Name
    :Certified Ethical Hacker v11 Exam
  • Certification
    :CEH v11
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :528 Q&As
  • Last Updated
    :May 12, 2024

EC-COUNCIL CEH v11 312-50V11 Questions & Answers

  • Question 41:

    Susan has attached to her company's network. She has managed to synchronize her boss's sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory.

    What kind of attack is Susan carrying on?

    A. A sniffing attack

    B. A spoofing attack

    C. A man in the middle attack

    D. A denial of service attack

  • Question 42:

    A user on your Windows 2000 network has discovered that he can use L0phtcrack to sniff the SMB exchanges which carry user logons. The user is plugged into a hub with 23 other systems.

    However, he is unable to capture any logons though he knows that other users are logging in.

    What do you think is the most likely reason behind this?

    A. There is a NIDS present on that segment.

    B. Kerberos is preventing it.

    C. Windows logons cannot be sniffed.

    D. L0phtcrack only sniffs logons to web servers.

  • Question 43:

    Henry Is a cyber security specialist hired by BlackEye - Cyber security solutions. He was tasked with discovering the operating system (OS) of a host. He used the Unkornscan tool to discover the OS of the target system. As a result, he obtained a TTL value, which Indicates that the target system is running a Windows OS. Identify the TTL value Henry obtained, which indicates that the target OS is Windows.

    A. 64

    B. 128

    C. 255

    D. 138

  • Question 44:

    Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the Information, he successfully performed an attack on the target government organization without being traced. Which of the following techniques is described in the above scenario?

    A. Dark web footprinting

    B. VoIP footpnnting

    C. VPN footprinting

    D. website footprinting

  • Question 45:

    Which of the following is assured by the use of a hash?

    A. Authentication

    B. Confidentiality

    C. Availability

    D. Integrity

  • Question 46:

    Attacker Lauren has gained the credentials of an organization's internal server system, and she was often logging in during irregular times to monitor the network activities. The organization was skeptical about the login times and appointed security professional Robert to determine the issue. Robert analyzed the compromised device to find incident details such as the type of attack, its severity, target, impact, method of propagation, and vulnerabilities exploited. What is the incident handling and response (IHandR) phase, in which Robert has determined these issues?

    A. Preparation

    B. Eradication

    C. Incident recording and assignment

    D. Incident triage

  • Question 47:

    This is an attack that takes advantage of a web site vulnerability in which the site displays content that includes un-sanitized user-provided data.

    What is this attack?

    A. Cross-site-scripting attack

    B. SQL Injection

    C. URL Traversal attack

    D. Buffer Overflow attack

  • Question 48:

    what is the port to block first in case you are suspicious that an loT device has been compromised?

    A. 22

    B. 443

    C. 48101

    D. 80

  • Question 49:

    Becky has been hired by a client from Dubai to perform a penetration test against one of their remote offices. Working from her location in Columbus, Ohio, Becky runs her usual reconnaissance scans to obtain basic information about their network. When analyzing the results of her Whois search, Becky notices that the IP was allocated to a location in Le Havre, France. Which regional Internet registry should Becky go to for detailed information?

    A. ARIN

    B. APNIC

    C. RIPE

    D. LACNIC

  • Question 50:

    There are multiple cloud deployment options depending on how isolated a customer's resources are from those of other customers. Shared environments share the costs and allow each customer to enjoy lower operations expenses. One solution Is for a customer to Join with a group of users or organizations to share a cloud environment. What is this cloud deployment option called?

    A. Hybrid

    B. Community

    C. Public

    D. Private

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V11 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.