Exam Details

  • Exam Code
    :312-50V11
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v11)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :528 Q&As
  • Last Updated
    :Apr 17, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V11 Questions & Answers

  • Question 151:

    After an audit, the auditors Inform you that there is a critical finding that you must tackle Immediately. You read the audit report, and the problem is the service running on port 369. Which service Is this and how can you tackle the problem?

    A. The service is LDAP. and you must change it to 636. which is LDPAPS.

    B. The service is NTP. and you have to change It from UDP to TCP in order to encrypt it

    C. The findings do not require immediate actions and are only suggestions.

    D. The service is SMTP, and you must change it to SMIME. which is an encrypted way to send emails.

  • Question 152:

    In an attempt to damage the reputation of a competitor organization, Hailey, a professional hacker, gathers a list of employee and client email addresses and other related information by using various search engines, social networking sites, and web spidering tools. In this process, she also uses an automated tool to gather a list of words from the target website to further perform a brute-force attack on the previously gathered email addresses.

    What is the tool used by Hailey for gathering a list of words from the target website?

    A. Shadowsocks

    B. CeWL

    C. Psiphon

    D. Orbot

  • Question 153:

    jane invites her friends Alice and John over for a LAN party. Alice and John access Jane's wireless network without a password. However. Jane has a long, complex password on her router. What attack has likely occurred?

    A. Wireless sniffing

    B. Piggybacking

    C. Evil twin

    D. Wardriving

  • Question 154:

    You are a penetration tester and are about to perform a scan on a specific server. The agreement that you signed with the client contains the following specific condition for the scan: "The attacker must scan every port on the server several times using a set of spoofed sources IP addresses. " Suppose that you are using Nmap to perform this scan. What flag will you use to satisfy this requirement?

    A. The -A flag

    B. The -g flag

    C. The -f flag

    D. The -D flag

  • Question 155:

    Which of the following is an extremely common IDS evasion technique in the web world?

    A. Spyware

    B. Subnetting

    C. Unicode Characters

    D. Port Knocking

  • Question 156:

    You have been authorized to perform a penetration test against a website. You want to use Google dorks to footprint the site but only want results that show file extensions. What Google dork operator would you use?

    A. filetype

    B. ext

    C. inurl

    D. site

  • Question 157:

    Garry is a network administrator in an organization. He uses SNMP to manage networked devices from a remote location. To manage nodes in the network, he uses MIB. which contains formal descriptions of all network objects managed by SNMP. He accesses the contents of MIB by using a web browser either by entering the IP address and Lseries.mlb or by entering the DNS library name and Lseries.mlb. He is currently retrieving information from an MIB that contains object types for workstations and server services. Which of the following types of MIB is accessed by Garry in the above scenario?

    A. LNMIB2.MIB

    B. WINS.MIB

    C. DHCP.MIS

    D. MIB_II.MIB

  • Question 158:

    CyberTech Inc. recently experienced SQL injection attacks on its official website. The company appointed Bob, a security professional, to build and incorporate defensive strategies against such attacks. Bob adopted a practice whereby only a list of entities such as the data type, range, size, and value, which have been approved for secured access, is accepted. What is the defensive technique employed by Bob in the above scenario?

    A. Output encoding

    B. Enforce least privileges

    C. Whitelist validation

    D. Blacklist validation

  • Question 159:

    Your organization has signed an agreement with a web hosting provider that requires you to take full responsibility of the maintenance of the cloud-based resources. Which of the following models covers this?

    A. Platform as a service

    B. Software as a service

    C. Functions as a

    D. service Infrastructure as a service

  • Question 160:

    Heather's company has decided to use a new customer relationship management tool. After performing the appropriate research, they decided to purchase a subscription to a cloud-hosted solution. The only administrative task that Heather will need to perform is the management of user accounts. The provider will take care of the hardware, operating system, and software administration including patching and monitoring. Which of the following is this type of solution?

    A. SaaS

    B. IaaS

    C. CaaS

    D. PasS

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V11 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.