Exam Details

  • Exam Code
    :312-50V11
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v11)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :528 Q&As
  • Last Updated
    :Apr 17, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V11 Questions & Answers

  • Question 261:

    Dayn, an attacker, wanted to detect if any honeypots are installed in a target network. For this purpose, he used a time-based TCP fingerprinting method to validate the response to a normal computer and the response of a honeypot to a manual SYN request. Which of the following techniques is employed by Dayn to detect honeypots?

    A. Detecting honeypots running on VMware

    B. Detecting the presence of Honeyd honeypots

    C. Detecting the presence of Snort_inline honeypots

    D. Detecting the presence of Sebek-based honeypots

  • Question 262:

    John, a professional hacker, targeted an organization that uses LDAP for accessing distributed directory services. He used an automated tool to anonymously query the IDAP service for sensitive information such as usernames. addresses, departmental details, and server names to launch further attacks on the target organization.

    What is the tool employed by John to gather information from the IDAP service?

    A. jxplorer

    B. Zabasearch

    C. EarthExplorer

    D. Ike-scan

  • Question 263:

    Bob received this text message on his mobile phone: "Hello, this is Scott Smelby from the Yahoo Bank. Kindly contact me for a vital transaction on: [email protected]". Which statement below is true?

    A. This is a scam as everybody can get a @yahoo address, not the Yahoo customer service employees.

    B. This is a scam because Bob does not know Scott.

    C. Bob should write to [email protected] to verify the identity of Scott.

    D. This is probably a legitimate message as it comes from a respectable organization.

  • Question 264:

    Rebecca, a security professional, wants to authenticate employees who use web services for safe and secure communication. In this process, she employs a component of the Web Service Architecture, which is an extension of SOAP, and it can maintain the integrity and confidentiality of SOAP messages.

    Which of the following components of the Web Service Architecture is used by Rebecca for securing the

    communication?

    A. WSDL

    B. WS Work Processes

    C. WS-Policy

    D. WS-Security

  • Question 265:

    is a set of extensions to DNS that provide the origin authentication of DNS data to DNS clients (resolvers) so as to reduce the threat of DNS poisoning, spoofing, and similar types of attacks.

    A. DNSSEC

    B. Resource records

    C. Resource transfer

    D. Zone transfer

  • Question 266:

    What would be the fastest way to perform content enumeration on a given web server by using the Gobuster tool?

    A. Performing content enumeration using the bruteforce mode and 10 threads

    B. Shipping SSL certificate verification

    C. Performing content enumeration using a wordlist

    D. Performing content enumeration using the bruteforce mode and random file extensions

  • Question 267:

    By using a smart card and pin, you are using a two-factor authentication that satisfies

    A. Something you are and something you remember

    B. Something you have and something you know

    C. Something you know and something you are

    D. Something you have and something you are

  • Question 268:

    Your company was hired by a small healthcare provider to perform a technical assessment on the network.

    What is the best approach for discovering vulnerabilities on a Windows-based computer?

    A. Use the built-in Windows Update tool

    B. Use a scan tool like Nessus

    C. Check MITRE.org for the latest list of CVE findings

    D. Create a disk image of a clean Windows installation

  • Question 269:

    Sophia is a shopping enthusiast who spends significant time searching for trendy outfits online. Clark, an attacker, noticed her activities several times and sent a fake email containing a deceptive page link to her social media page displaying all-new and trendy outfits. In excitement, Sophia clicked on the malicious link and logged in to that page using her valid credentials. Which of the following tools is employed by Clark to create the spoofed email?

    A. PyLoris

    B. Slowloris

    C. Evilginx

    D. PLCinject

  • Question 270:

    When discussing passwords, what is considered a brute force attack?

    A. You attempt every single possibility until you exhaust all possible combinations or discover the password

    B. You threaten to use the rubber hose on someone unless they reveal their password

    C. You load a dictionary of words into your cracking program

    D. You create hashes of a large number of words and compare it with the encrypted passwords

    E. You wait until the password expires

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V11 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.