Exam Details

  • Exam Code
    :312-50V11
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v11)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :528 Q&As
  • Last Updated
    :Apr 17, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V11 Questions & Answers

  • Question 311:

    What is the way to decide how a packet will move from an untrusted outside host to a protected inside that is behind a firewall, which permits the hacker to determine which ports are open and if the packets can pass through the packet- filtering of the firewall?

    A. Session hijacking

    B. Firewalking

    C. Man-in-the middle attack

    D. Network sniffing

  • Question 312:

    What is the algorithm used by LM for Windows2000 SAM?

    A. MD4

    B. DES

    C. SHA

    D. SSL

  • Question 313:

    John, a professional hacker, targeted CyberSol Inc., an MNC. He decided to discover the loT devices connected in the target network that are using default credentials and are vulnerable to various hijacking attacks. For this purpose, he used an automated tool to scan the target network for specific types of loT devices and detect whether they are using the default, factory-set credentials. What is the tool employed by John in the above scenario?

    A. loTSeeker

    B. loT Inspector

    C. ATandT loT Platform

    D. Azure loT Central

  • Question 314:

    The tools which receive event logs from servers, network equipment, and applications, and perform analysis and correlation on those logs, and can generate alarms for security relevant issues, are known as what?

    A. network Sniffer

    B. Vulnerability Scanner

    C. Intrusion prevention Server

    D. Security incident and event Monitoring

  • Question 315:

    James is working as an ethical hacker at Technix Solutions. The management ordered James to discover how vulnerable its network is towards footprinting attacks. James took the help of an open-source framework for performing automated reconnaissance activities. This framework helped James in gathering information using free tools and resources. What is the framework used by James to conduct footprinting and reconnaissance activities?

    A. WebSploit Framework

    B. Browser Exploitation Framework

    C. OSINT framework

    D. SpeedPhish Framework

  • Question 316:

    Under what conditions does a secondary name server request a zone transfer from a primary name server?

    A. When a primary SOA is higher that a secondary SOA

    B. When a secondary SOA is higher that a primary SOA

    C. When a primary name server has had its service restarted

    D. When a secondary name server has had its service restarted

    E. When the TTL falls to zero

  • Question 317:

    Attacker Simon targeted the communication network of an organization and disabled the security controls of NetNTLMvl by modifying the values of LMCompatibilityLevel, NTLMMinClientSec, and RestrictSendingNTLMTraffic. He then extracted all the non- network logon tokens from all the active processes to masquerade as a legitimate user to launch further attacks. What is the type of attack performed by Simon?

    A. Internal monologue attack

    B. Combinator attack

    C. Rainbow table attack

    D. Dictionary attack

  • Question 318:

    John the Ripper is a technical assessment tool used to test the weakness of which of the following?

    A. Passwords

    B. File permissions

    C. Firewall rulesets

    D. Usernames

  • Question 319:

    Take a look at the following attack on a Web Server using obstructed URL:

    How would you protect from these attacks?

    A. Configure the Web Server to deny requests involving "hex encoded" characters

    B. Create rules in IDS to alert on strange Unicode requests

    C. Use SSL authentication on Web Servers

    D. Enable Active Scripts Detection at the firewall and routers

  • Question 320:

    Jacob works as a system administrator in an organization. He wants to extract the source code of a mobile application and disassemble the application to analyze its design flaws. Using this technique, he wants to fix any bugs in the application, discover underlying vulnerabilities, and improve defense strategies against attacks.

    What is the technique used by Jacob in the above scenario to improve the security of the mobile application?

    A. Reverse engineering

    B. App sandboxing

    C. Jailbreaking

    D. Social engineering

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V11 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.