Exam Details

  • Exam Code
    :312-50V11
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v11)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :528 Q&As
  • Last Updated
    :Apr 09, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V11 Questions & Answers

  • Question 91:

    An attacker attaches a rogue router in a network. He wants to redirect traffic to a LAN attached to his router as part of a man-in-the-middle attack. What measure on behalf of the legitimate admin can mitigate this attack?

    A. Make sure that legitimate network routers are configured to run routing protocols with authentication.

    B. Disable all routing protocols and only use static routes

    C. Only using OSPFv3 will mitigate this risk.

    D. Redirection of the traffic cannot happen unless the admin allows it explicitly.

  • Question 92:

    Which of the following is not a Bluetooth attack?

    A. Bluedriving

    B. Bluesmacking

    C. Bluejacking

    D. Bluesnarfing

  • Question 93:

    When purchasing a biometric system, one of the considerations that should be reviewed is the processing speed. Which of the following best describes what it is meant by processing?

    A. The amount of time and resources that are necessary to maintain a biometric system

    B. How long it takes to setup individual user accounts

    C. The amount of time it takes to be either accepted or rejected from when an individual provides identification and authentication information

    D. The amount of time it takes to convert biometric data into a template on a smart card

  • Question 94:

    Susan, a software developer, wants her web API to update other applications with the latest information. For this purpose, she uses a user-defined HTTP tailback or push APIs that are raised based on trigger events: when invoked, this feature supplies data to other applications so that users can instantly receive real-time Information.

    Which of the following techniques is employed by Susan?

    A. web shells

    B. Webhooks

    C. REST API

    D. SOAP API

  • Question 95:

    Which of the following provides a security professional with most information about the system's security posture?

    A. Phishing, spamming, sending trojans

    B. Social engineering, company site browsing tailgating

    C. Wardriving, warchalking, social engineering

    D. Port scanning, banner grabbing service identification

  • Question 96:

    Peter is surfing the internet looking for information about DX Company. Which hacking process is Peter doing?

    A. Scanning

    B. Footprinting

    C. Enumeration

    D. System Hacking

  • Question 97:

    Abel, a security professional, conducts penetration testing in his client organization to check for any security loopholes. He launched an attack on the DHCP servers by broadcasting forged DHCP requests and leased all the DHCP addresses available in the DHCP scope until the server could not issue any more IP addresses. This led to a Dos attack, and as a result, legitimate employees were unable to access the clients network. Which of the following attacks did Abel perform in the above scenario?

    A. VLAN hopping

    B. DHCP starvation

    C. Rogue DHCP server attack

    D. STP attack

  • Question 98:

    Which of the following Google advanced search operators helps an attacker in gathering information about websites that are similar to a specified target URL?

    A. [inurl:]

    B. [related:]

    C. [info:]

    D. [site:]

  • Question 99:

    Firewalk has just completed the second phase (the scanning phase) and a technician receives the output shown below. What conclusions can be drawn based on these scan results?

    TCP port 21 no response

    TCP port 22 no response

    TCP port 23 Time-to-live exceeded

    A. The lack of response from ports 21 and 22 indicate that those services are not running on the destination server

    B. The scan on port 23 was able to make a connection to the destination host prompting the firewall to respond with a TTL error

    C. The scan on port 23 passed through the filtering device. This indicates that port 23 was not blocked at the firewall

    D. The firewall itself is blocking ports 21 through 23 and a service is listening on port 23 of the target host

  • Question 100:

    You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity, what tool would you most likely select?

    A. Nmap

    B. Cain and Abel

    C. Nessus

    D. Snort

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V11 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.