Exam Details

  • Exam Code
    :312-50V11
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v11)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :528 Q&As
  • Last Updated
    :Apr 17, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V11 Questions & Answers

  • Question 221:

    If executives are found liable for not properly protecting their company's assets and information systems, what type of law would apply in this situation?

    A. Criminal

    B. International

    C. Common

    D. Civil

  • Question 222:

    Clark is a professional hacker. He created and configured multiple domains pointing to the same host to switch quickly between the domains and avoid detection. Identify the behavior of the adversary In the above scenario.

    A. use of command-line interface

    B. Data staging

    C. Unspecified proxy activities

    D. Use of DNS tunneling

  • Question 223:

    Based on the below log, which of the following sentences are true?

    Mar 1, 2016, 7:33:28 AM 10.240.250.23 - 54373 10.249.253.15 - 22 tcp_ip

    A. Application is FTP and 10.240.250.23 is the client and 10.249.253.15 is the server.

    B. Application is SSH and 10.240.250.23 is the server and 10.249.253.15 is the client.

    C. SSH communications are encrypted; it's impossible to know who is the client or the server.

    D. Application is SSH and 10.240.250.23 is the client and 10.249.253.15 is the server.

  • Question 224:

    Miley, a professional hacker, decided to attack a target organization's network. To perform the attack, she used a tool to send fake ARP messages over the target network to link her MAC address with the target system's IP address. By performing this, Miley received messages directed to the victim's MAC address and further used the tool to intercept, steal, modify, and block sensitive communication to the target system. What is the tool employed by Miley to perform the above attack?

    A. Gobbler

    B. KDerpNSpoof

    C. BetterCAP

    D. Wireshark

  • Question 225:

    An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", the user is directed to a phishing site.

    Which file does the attacker need to modify?

    A. Boot.ini

    B. Sudoers

    C. Networks

    D. Hosts

  • Question 226:

    You have successfully logged on a Linux system. You want to now cover your trade Your login attempt may be logged on several files located in /var/log. Which file does NOT belongs to the list:

    A. user.log

    B. auth.fesg

    C. wtmp

    D. btmp

  • Question 227:

    Todd has been asked by the security officer to purchase a counter-based authentication system. Which of the following best describes this type of system?

    A. A biometric system that bases authentication decisions on behavioral attributes.

    B. A biometric system that bases authentication decisions on physical attributes.

    C. An authentication system that creates one-time passwords that are encrypted with secret keys.

    D. An authentication system that uses passphrases that are converted into virtual passwords.

  • Question 228:

    Given below are different steps involved in the vulnerability-management life cycle.

    1) Remediation 2) Identify assets and create a baseline 3) Verification 4) Monitor 5) Vulnerability scan 6) Risk assessment

    Identify the correct sequence of steps involved in vulnerability management.

    A. 2-->5-->6-->1-->3-->4

    B. 2-->1-->5-->6-->4-->3

    C. 2-->4-->5-->3-->6--> 1

    D. 1-->2-->3-->4-->5-->6

  • Question 229:

    Which Intrusion Detection System is the best applicable for large environments where critical assets on the network need extra scrutiny and is ideal for observing sensitive network segments?

    A. Honeypots

    B. Firewalls

    C. Network-based intrusion detection system (NIDS)

    D. Host-based intrusion detection system (HIDS)

  • Question 230:

    An attacker scans a host with the below command. Which three flags are set?

    # nmap -sX host.domain.com

    A. This is SYN scan. SYN flag is set.

    B. This is Xmas scan. URG, PUSH and FIN are set.

    C. This is ACK scan. ACK flag is set.

    D. This is Xmas scan. SYN and ACK flags are set.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V11 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.