Exam Details

  • Exam Code
    :312-50V11
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v11)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :528 Q&As
  • Last Updated
    :Apr 17, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V11 Questions & Answers

  • Question 411:

    An organization is performing a vulnerability assessment tor mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization's machines to detect which ports are attached to services such as an email server, a web server or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests. What is the type of vulnerability assessment solution that James employed in the above scenario?

    A. Product-based solutions

    B. Tree-based assessment

    C. Service-based solutions

    D. inference-based assessment

  • Question 412:

    During the enumeration phase. Lawrence performs banner grabbing to obtain information such as OS details and versions of services running. The service that he enumerated runs directly on TCP port 445.

    Which of the following services is enumerated by Lawrence in this scenario?

    A. Server Message Block (SMB)

    B. Network File System (NFS)

    C. Remote procedure call (RPC)

    D. Telnet

  • Question 413:

    Emily, an extrovert obsessed with social media, posts a large amount of private information, photographs, and location tags of recently visited places. Realizing this. James, a professional hacker, targets Emily and her acquaintances, conducts a location search to detect their geolocation by using an automated tool, and gathers information to perform other sophisticated attacks. What is the tool employed by James in the above scenario?

    A. ophcrack

    B. Hootsuite

    C. VisualRoute

    D. HULK

  • Question 414:

    Which of the following Linux commands will resolve a domain name into IP address?

    A. >host-t a hackeddomain.com

    B. >host-t ns hackeddomain.com

    C. >host -t soa hackeddomain.com

    D. >host -t AXFR hackeddomain.com

  • Question 415:

    Windows LAN Manager (LM) hashes are known to be weak.

    Which of the following are known weaknesses of LM? (Choose three.)

    A. Converts passwords to uppercase.

    B. Hashes are sent in clear text over the network.

    C. Makes use of only 32-bit encryption.

    D. Effective length is 7 characters.

  • Question 416:

    You went to great lengths to install all the necessary technologies to prevent hacking attacks, such as expensive firewalls, antivirus software, anti-spam systems and intrusion detection/prevention tools in your company's network. You have configured the most secure policies and tightened every device on your network. You are confident that hackers will never be able to gain access to your network with complex security system in place.

    Your peer, Peter Smith who works at the same department disagrees with you.

    He says even the best network security technologies cannot prevent hackers gaining access to the network because of presence of "weakest link" in the security chain.

    What is Peter Smith talking about?

    A. Untrained staff or ignorant computer users who inadvertently become the weakest link in your security chain

    B. "zero-day" exploits are the weakest link in the security chain since the IDS will not be able to detect these attacks

    C. "Polymorphic viruses" are the weakest link in the security chain since the Anti-Virus scanners will not be able to detect these attacks

    D. Continuous Spam e-mails cannot be blocked by your security system since spammers use different techniques to bypass the filters in your gateway

  • Question 417:

    if you send a TCP ACK segment to a known closed port on a firewall but it does not respond with an RST. what do you know about the firewall you are scanning?

    A. There is no firewall in place.

    B. This event does not tell you encrypting about the firewall.

    C. It is a stateful firewall

    D. It Is a non-stateful firewall.

  • Question 418:

    An attacker runs netcat tool to transfer a secret file between two hosts.

    He is worried about information being sniffed on the network.

    How would the attacker use netcat to encrypt the information before transmitting onto the wire?

    A. Machine A: netcat -l -p -s password 1234 < testfileMachine B: netcat

    B. Machine A: netcat -l -e magickey -p 1234 < testfileMachine B: netcat

    C. Machine A: netcat -l -p 1234 < testfile -pw passwordMachine B: netcat 1234 -pw password

    D. Use cryptcat instead of netcat

  • Question 419:

    What is the purpose of a demilitarized zone on a network?

    A. To scan all traffic coming through the DMZ to the internal network

    B. To only provide direct access to the nodes within the DMZ and protect the network behind it

    C. To provide a place to put the honeypot

    D. To contain the network devices you wish to protect

  • Question 420:

    What is the main security service a cryptographic hash provides?

    A. Integrity and ease of computation

    B. Message authentication and collision resistance

    C. Integrity and collision resistance

    D. Integrity and computational in-feasibility

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V11 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.