Exam Details

  • Exam Code
    :312-50V11
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v11)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :528 Q&As
  • Last Updated
    :Apr 17, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V11 Questions & Answers

  • Question 391:

    What is the following command used for?

    net use \targetipc$ "" /u:"" A. Grabbing the etc/passwd file

    B. Grabbing the SAM

    C. Connecting to a Linux computer through Samba.

    D. This command is used to connect as a null session

    E. Enumeration of Cisco routers

  • Question 392:

    Within the context of Computer Security, which of the following statements describes Social Engineering best?

    A. Social Engineering is the act of publicly disclosing information

    B. Social Engineering is the means put in place by human resource to perform time accounting

    C. Social Engineering is the act of getting needed information from a person rather than breaking into a system

    D. Social Engineering is a training program within sociology studies

  • Question 393:

    Bob was recently hired by a medical company after it experienced a major cyber security breach. Many patients are complaining that their personal medical records are fully exposed on the Internet and someone can find them with a simple Google search. Bob's boss is very worried because of regulations that protect those data. Which of the following regulations is mostly violated?

    A. HIPPA/PHl

    B. Pll

    C. PCIDSS

    D. ISO 2002

  • Question 394:

    Which Nmap switch helps evade IDS or firewalls?

    A. -n/-R

    B. -0N/-0X/-0G

    C. -T D. -D

  • Question 395:

    Every company needs a formal written document which spells out to employees precisely what they are allowed to use the company's systems for, what is prohibited, and what will happen to them if they break the rules. Two printed copies of the policy should be given to every employee as soon as possible after they join the organization. The employee should be asked to sign one copy, which should be safely filed by the company. No one should be allowed to use the company's computer systems until they have signed the policy in acceptance of its terms.

    What is this document called?

    A. Information Audit Policy (IAP)

    B. Information Security Policy (ISP)

    C. Penetration Testing Policy (PTP)

    D. Company Compliance Policy (CCP)

  • Question 396:

    An attacker is trying to redirect the traffic of a small office. That office is using their own mail server, DNS server and NTP server because of the importance of their job. The attacker gain access to the DNS server and redirect the direction www.google.com to his own IP address. Now when the employees of the office want to

    go to Google they are being redirected to the attacker machine. What is the name of this kind of attack?

    A. MAC Flooding

    B. Smurf Attack

    C. DNS spoofing

    D. ARP Poisoning

  • Question 397:

    Which of the following tools can be used to perform a zone transfer?

    A. NSLookup

    B. Finger

    C. Dig

    D. Sam Spade

    E. Host

    F. Netcat

    G. Neotrace

  • Question 398:

    which of the following Bluetooth hacking techniques refers to the theft of information from a wireless device through Bluetooth?

    A. Bluesmacking

    B. Bluebugging

    C. Bluejacking

    D. Bluesnarfing

  • Question 399:

    How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?

    A. There is no way to tell because a hash cannot be reversed

    B. The right most portion of the hash is always the same

    C. The hash always starts with AB923D

    D. The left most portion of the hash is always the same

    E. A portion of the hash will be all 0's

  • Question 400:

    On performing a risk assessment, you need to determine the potential impacts when some of the critical business processes of the company interrupt its service.

    What is the name of the process by which you can determine those critical businesses?

    A. Emergency Plan Response (EPR)

    B. Business Impact Analysis (BIA)

    C. Risk Mitigation

    D. Disaster Recovery Planning (DRP)

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V11 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.