Exam Details

  • Exam Code
    :312-50V11
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v11)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :528 Q&As
  • Last Updated
    :Apr 17, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V11 Questions & Answers

  • Question 401:

    Johnson, an attacker, performed online research for the contact details of reputed cybersecurity firms. He found the contact number of sibertech.org and dialed the number, claiming himself to represent a technical support team from a vendor. He warned that a specific server is about to be compromised and requested sibertech.org to follow the provided instructions. Consequently, he prompted the victim to execute unusual commands and install malicious files, which were then used to collect and pass critical Information to Johnson's machine. What is the social engineering technique Steve employed in the above scenario?

    A. Quid pro quo

    B. Diversion theft

    C. Elicitation

    D. Phishing

  • Question 402:

    Jake, a professional hacker, installed spyware on a target iPhone to spy on the target user's activities. He can take complete control of the target mobile device by jailbreaking the device remotely and record audio, capture screenshots, and monitor all phone calls and SMS messages. What is the type of spyware that Jake used to infect the target device?

    A. DroidSheep

    B. Androrat

    C. Zscaler

    D. Trident

  • Question 403:

    User A is writing a sensitive email message to user B outside the local network. User A has chosen to use PKI to secure his message and ensure only user B can read the sensitive email. At what layer of the OSI layer does the encryption and decryption of the message take place?

    A. Application

    B. Transport

    C. Session

    D. Presentation

  • Question 404:

    Which method of password cracking takes the most time and effort?

    A. Dictionary attack

    B. Shoulder surfing

    C. Rainbow tables

    D. Brute force

  • Question 405:

    To hide the file on a Linux system, you have to start the filename with a specific character. What is the character?

    A. Exclamation mark (!)

    B. Underscore (_)

    C. Tilde H D. Period (.)

  • Question 406:

    Study the snort rule given below and interpret the rule. alert tcp any any --> 192.168.1.0/24 (content:"|00 01 86 a5|"; msG. "mountd access";)

    A. An alert is generated when a TCP packet is generated from any IP on the 192.168.1.0 subnet and destined to any IP on port 111

    B. An alert is generated when any packet other than a TCP packet is seen on the network and destined for the 192.168.1.0 subnet

    C. An alert is generated when a TCP packet is originated from port 111 of any IP address to the

    192.168.1.0 subnet

    D. An alert is generated when a TCP packet originating from any IP address is seen on the network and destined for any IP address on the 192.168.1.0 subnet on port 111

  • Question 407:

    One of your team members has asked you to analyze the following SOA record.

    What is the TTL? Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.)

    A. 200303028

    B. 3600

    C. 604800

    D. 2400

    E. 60

    F. 4800

  • Question 408:

    Peter, a system administrator working at a reputed IT firm, decided to work from his home and login remotely. Later, he anticipated that the remote connection could be exposed to session hijacking. To curb this possibility, he implemented a technique that creates a safe and encrypted tunnel over a public network to securely send and receive sensitive information and prevent hackers from decrypting the data flow between the endpoints. What is the technique followed by Peter to send files securely through a remote connection?

    A. DMZ

    B. SMB signing

    C. VPN

    D. Switch network

  • Question 409:

    Which of the following DoS tools is used to attack target web applications by starvation of available sessions on the web server?

    The tool keeps sessions at halt using never-ending POST transmissions and sending an arbitrarily large content-length header value.

    A. My Doom

    B. Astacheldraht

    C. R-U-Dead-Yet?(RUDY)

    D. LOIC

  • Question 410:

    You work for Acme Corporation as Sales Manager. The company has tight network security restrictions. You are trying to steal data from the company's Sales database (Sales.xls) and transfer them to your home computer. Your company filters and monitors traffic that leaves from the internal network to the Internet. How will you achieve this without raising suspicion?

    A. Encrypt the Sales.xls using PGP and e-mail it to your personal gmail account

    B. Package the Sales.xls using Trojan wrappers and telnet them back your home computer

    C. You can conceal the Sales.xls database in another file like photo.jpg or other files and send it out in an innocent looking email or file transfer using Steganography techniques

    D. Change the extension of Sales.xls to sales.txt and upload them as attachment to your hotmail account

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V11 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.