Exam Details

  • Exam Code
    :312-50V11
  • Exam Name
    :Certified Ethical Hacker v11 Exam
  • Certification
    :CEH v11
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :528 Q&As
  • Last Updated
    :May 12, 2024

EC-COUNCIL CEH v11 312-50V11 Questions & Answers

  • Question 521:

    Ralph, a professional hacker, targeted Jane, who had recently bought new systems for her company. After a few days, Ralph contacted Jane while masquerading as a legitimate customer support executive, informing that her systems need to be serviced for proper functioning and that customer support will send a computer technician. Jane promptly replied positively. Ralph entered Jane's company using this opportunity and gathered sensitive information by scanning terminals for passwords, searching for important documents in desks, and rummaging bins. What is the type of attack technique Ralph used on jane?

    A. Dumpster diving

    B. Eavesdropping

    C. Shoulder surfing

    D. impersonation

  • Question 522:

    Which of the following statements is TRUE?

    A. Packet Sniffers operate on the Layer 1 of the OSI model.

    B. Packet Sniffers operate on Layer 2 of the OSI model.

    C. Packet Sniffers operate on both Layer 2 and Layer 3 of the OSI model.

    D. Packet Sniffers operate on Layer 3 of the OSI model.

  • Question 523:

    An attacker identified that a user and an access point are both compatible with WPA2 and WPA3 encryption. The attacker installed a rogue access point with only WPA2 compatibility in the vicinity and forced the victim to go through the WPA2 four-way handshake to get connected. After the connection was established, the attacker used automated tools to crack WPA2-encrypted messages. What is the attack performed in the above scenario?

    A. Timing-based attack

    B. Side-channel attack

    C. Downgrade security attack

    D. Cache-based attack

  • Question 524:

    What is the common name for a vulnerability disclosure program opened by companies In platforms such as HackerOne?

    A. Vulnerability hunting program

    B. Bug bounty program

    C. White-hat hacking program

    D. Ethical hacking program

  • Question 525:

    what are common files on a web server that can be misconfigured and provide useful Information for a hacker such as verbose error messages?

    A. httpd.conf

    B. administration.config

    C. idq.dll

    D. php.ini

  • Question 526:

    When configuring wireless on his home router, Javik disables SSID broadcast. He leaves authentication "open" but sets the SSID to a 32-character string of random letters and numbers.

    What is an accurate assessment of this scenario from a security perspective?

    A. Since the SSID is required in order to connect, the 32-character string is sufficient to prevent brute-force attacks.

    B. Disabling SSID broadcast prevents 802.11 beacons from being transmitted from the access point, resulting in a valid setup leveraging "security through obscurity".

    C. It is still possible for a hacker to connect to the network after sniffing the SSID from a successful wireless association.

    D. Javik's router is still vulnerable to wireless hacking attempts because the SSID broadcast setting can be enabled using a specially crafted packet sent to the hardware address of the access point.

  • Question 527:

    When considering how an attacker may exploit a web server, what is web server footprinting?

    A. When an attacker implements a vulnerability scanner to identify weaknesses

    B. When an attacker creates a complete profile of the site's external links and file structures

    C. When an attacker gathers system-level data, including account details and server names

    D. When an attacker uses a brute-force attack to crack a web-server password

  • Question 528:

    In the field of cryptanalysis, what is meant by a "rubber-hose" attack?

    A. Forcing the targeted keystream through a hardware-accelerated device such as an ASIC.

    B. A backdoor placed into a cryptographic algorithm by its creator.

    C. Extraction of cryptographic secrets through coercion or torture.

    D. Attempting to decrypt ciphertext by making logical assumptions about the contents of the original plaintext.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V11 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.