Exam Details

  • Exam Code
    :312-50V11
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v11)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :528 Q&As
  • Last Updated
    :Apr 17, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V11 Questions & Answers

  • Question 361:

    Why should the security analyst disable/remove unnecessary ISAPI filters?

    A. To defend against social engineering attacks

    B. To defend against webserver attacks

    C. To defend against jailbreaking

    D. To defend against wireless attacks

  • Question 362:

    Gavin owns a white-hat firm and is performing a website security audit for one of his clients. He begins by running a scan which looks for common misconfigurations and outdated software versions. Which of the following tools is he most likely using?

    A. Nikto

    B. Nmap

    C. Metasploit

    D. Armitage

  • Question 363:

    The network team has well-established procedures to follow for creating new rules on the firewall. This includes having approval from a manager prior to implementing any new rules. While reviewing the firewall configuration, you notice a recently implemented rule but cannot locate manager approval for it. What would be a good step to have in the procedures for a situation like this?

    A. Have the network team document the reason why the rule was implemented without prior manager approval.

    B. Monitor all traffic using the firewall rule until a manager can approve it.

    C. Do not roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.

    D. Immediately roll back the firewall rule until a manager can approve it

  • Question 364:

    The following is an entry captured by a network IDS. You are assigned the task of analyzing this entry. You notice the value 0x90, which is the most common NOOP instruction for the Intel processor. You figure that

    the attacker is attempting a buffer overflow attack. You also notice "/bin/sh" in the ASCII part of the output. As an analyst what would you conclude about the attack?

    A. The buffer overflow attack has been neutralized by the IDS

    B. The attacker is creating a directory on the compromised machine

    C. The attacker is attempting a buffer overflow attack and has succeeded

    D. The attacker is attempting an exploit that launches a command-line shell

  • Question 365:

    infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?

    A. Reconnaissance

    B. Maintaining access

    C. Scanning

    D. Gaining access

  • Question 366:

    A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0/24. Which of the following has occurred?

    A. The computer is not using a private IP address.

    B. The gateway is not routing to a public IP address.

    C. The gateway and the computer are not on the same network.

    D. The computer is using an invalid IP address.

  • Question 367:

    Firewalls are the software or hardware systems that are able to control and monitor the traffic coming in and out the target network based on pre-defined set of rules. Which of the following types of firewalls can protect against SQL injection attacks?

    A. Data-driven firewall

    B. Packet firewall

    C. Web application firewall

    D. Stateful firewall

  • Question 368:

    During the process of encryption and decryption, what keys are shared?

    A. Private keys

    B. User passwords

    C. Public keys

    D. Public and private keys

  • Question 369:

    in this form of encryption algorithm, every Individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?

    A. IDEA

    B. Triple Data Encryption standard

    C. MDS encryption algorithm

    D. AES

  • Question 370:

    This TCP flag instructs the sending system to transmit all buffered data immediately.

    A. SYN

    B. RST

    C. PSH

    D. URG

    E. FIN

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V11 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.