Exam Details

  • Exam Code
    :312-50V11
  • Exam Name
    :Certified Ethical Hacker v11 Exam
  • Certification
    :CEH v11
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :528 Q&As
  • Last Updated
    :May 12, 2024

EC-COUNCIL CEH v11 312-50V11 Questions & Answers

  • Question 511:

    jane, an ethical hacker. Is testing a target organization's web server and website to identity security loopholes. In this process, she copied the entire website and its content on a local drive to view the complete profile of the site's directory structure, file structure, external links, images, web pages, and so on. This information helps jane map the website's directories and gain valuable information. What is the attack technique employed by Jane in the above scenario?

    A. website mirroring

    B. Session hijacking

    C. Web cache poisoning

    D. Website defacement

  • Question 512:

    Morris, an attacker, wanted to check whether the target AP is in a locked state. He attempted using

    different utilities to identify WPS-enabled APs in the target wireless network. Ultimately, he succeeded with

    one special command-line utility.

    Which of the following command-line utilities allowed Morris to discover the WPS-enabled APs?

    A. wash

    B. ntptrace

    C. macof

    D. net View

  • Question 513:

    E-mail scams and mail fraud are regulated by which of the following?

    A. 18 U.S.C. par. 1030 Fraud and Related activity in connection with Computers

    B. 18 U.S.C. par. 1029 Fraud and Related activity in connection with Access Devices

    C. 18 U.S.C. par. 1362 Communication Lines, Stations, or Systems

    D. 18 U.S.C. par. 2510 Wire and Electronic Communications Interception and Interception of Oral Communication

  • Question 514:

    Gerard, a disgruntled ex-employee of Sunglass IT Solutions, targets this organization to perform sophisticated attacks and bring down its reputation in the market. To launch the attacks process, he performed DNS footprinting to gather information about ONS servers and to identify the hosts connected in the target network. He used an automated tool that can retrieve information about DNS zone data including DNS domain names, computer names. IP addresses. DNS records, and network Who is records. He further exploited this information to launch other sophisticated attacks. What is the tool employed by Gerard in the above scenario?

    A. Knative

    B. zANTI

    C. Towelroot

    D. Bluto

  • Question 515:

    John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker Installed a scanner on a machine belonging to one of the vktims and scanned several machines on the same network to Identify vulnerabilities to perform further exploitation. What is the type of vulnerability assessment tool employed by John in the above scenario?

    A. Proxy scanner

    B. Agent-based scanner

    C. Network-based scanner

    D. Cluster scanner

  • Question 516:

    Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients. You are requested to accept the offer and you oblige. After 2 days, Bab denies that he had ever sent a mail. What do you want to ""know"" to prove yourself that it was Bob who had send a mail?

    A. Non-Repudiation

    B. Integrity

    C. Authentication

    D. Confidentiality

  • Question 517:

    Don, a student, came across a gaming app in a third-party app store and Installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after Installing the app. What is the attack performed on Don in the above scenario?

    A. SMS phishing attack

    B. SIM card attack

    C. Agent Smith attack

    D. Clickjacking

  • Question 518:

    Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?

    A. symmetric algorithms

    B. asymmetric algorithms

    C. hashing algorithms

    D. integrity algorithms

  • Question 519:

    Which tool can be used to silently copy files from USB devices?

    A. USB Grabber

    B. USB Snoopy

    C. USB Sniffer

    D. Use Dumper

  • Question 520:

    Leverox Solutions hired Arnold, a security professional, for the threat intelligence process. Arnold collected information about specific threats against the organization. From this information, he retrieved contextual information about security events and incidents that helped him disclose potential risks and gain insight into attacker methodologies. He collected the information from sources such as humans, social media, and chat rooms as well as from events that resulted in cyberattacks. In this process, he also prepared a report that includes identified malicious activities, recommended courses of action, and warnings for emerging attacks. What is the type of threat intelligence collected by Arnold in the above scenario?

    A. Strategic threat intelligence

    B. Tactical threat intelligence

    C. Operational threat intelligence

    D. Technical threat intelligence

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V11 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.