Exam Details

  • Exam Code
    :312-50V11
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v11)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :528 Q&As
  • Last Updated
    :Apr 09, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V11 Questions & Answers

  • Question 101:

    Eve is spending her day scanning the library computers. She notices that Alice is using a computer whose port 445 is active and listening. Eve uses the ENUM tool to enumerate Alice machine. From the command prompt, she types the following command.

    What is Eve trying to do?

    A. Eve is trying to connect as a user with Administrator privileges

    B. Eve is trying to enumerate all users with Administrative privileges

    C. Eve is trying to carry out a password crack for user Administrator

    D. Eve is trying to escalate privilege of the null user to that of Administrator

  • Question 102:

    Chandler works as a pen-tester in an IT-firm in New York. As a part of detecting viruses in the systems, he uses a detection method where the anti-virus executes the malicious codes on a virtual machine to simulate CPU and memory activities. Which type of virus detection method did Chandler use in this context?

    A. Heuristic Analysis

    B. Code Emulation

    C. Scanning

    D. Integrity checking

  • Question 103:

    Why is a penetration test considered to be more thorough than vulnerability scan?

    A. Vulnerability scans only do host discovery and port scanning by default.

    B. A penetration test actively exploits vulnerabilities in the targeted infrastructure, while a vulnerability scan does not typically involve active exploitation.

    C. It is not ?a penetration test is often performed by an automated tool, while a vulnerability scan requires active engagement.

    D. The tools used by penetration testers tend to have much more comprehensive vulnerability databases.

  • Question 104:

    What hacking attack is challenge/response authentication used to prevent?

    A. Replay attacks

    B. Scanning attacks

    C. Session hijacking attacks

    D. Password cracking attacks

  • Question 105:

    While scanning with Nmap, Patin found several hosts which have the IP ID of incremental sequences. He then decided to conduct: nmap -Pn -p- -si kiosk.adobe.com www.riaa.com. kiosk.adobe.com is the host with incremental IP ID sequence. What is the purpose of using "-si" with Nmap?

    A. Conduct stealth scan

    B. Conduct ICMP scan

    C. Conduct IDLE scan

    D. Conduct silent scan

  • Question 106:

    Vlady works in a fishing company where the majority of the employees have very little understanding of IT let alone IT Security. Several information security issues that Vlady often found includes, employees sharing password, writing his/her password on a post it note and stick it to his/her desk, leaving the computer unlocked, didn't log out from emails or other social media accounts, and etc.

    After discussing with his boss, Vlady decided to make some changes to improve the security environment in his company. The first thing that Vlady wanted to do is to make the employees understand the importance of keeping confidential information, such as password, a secret and they should not share it with other persons.

    Which of the following steps should be the first thing that Vlady should do to make the employees in his company understand to importance of keeping confidential information a secret?

    A. Warning to those who write password on a post it note and put it on his/her desk

    B. Developing a strict information security policy

    C. Information security awareness training

    D. Conducting a one to one discussion with the other employees about the importance of information security

  • Question 107:

    Nicolas just found a vulnerability on a public-facing system that is considered a zero-day vulnerability. He sent an email to the owner of the public system describing the problem and how the owner can protect themselves from that vulnerability. He also sent an email to Microsoft informing them of the problem that their systems are exposed to. What type of hacker is Nicolas?

    A. Red hat

    B. white hat

    C. Black hat

    D. Gray hat

  • Question 108:

    Which Metasploit Framework tool can help penetration tester for evading Anti-virus Systems?

    A. msfpayload

    B. msfcli

    C. msfd

    D. msfencode

  • Question 109:

    Attacker Rony Installed a rogue access point within an organization's perimeter and attempted to Intrude into its internal network. Johnson, a security auditor, identified some unusual traffic in the internal network that is aimed at cracking the authentication mechanism. He immediately turned off the targeted network and tested for any weak and outdated security mechanisms that are open to attack. What is the type of vulnerability assessment performed by Johnson in the above scenario?

    A. Distributed assessment

    B. Wireless network assessment

    C. Most-based assessment

    D. Application assessment

  • Question 110:

    Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?

    A. Nikto

    B. John the Ripper

    C. Dsniff

    D. Snort

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V11 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.