Exam Details

  • Exam Code
    :312-50V11
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v11)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :528 Q&As
  • Last Updated
    :Apr 17, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V11 Questions & Answers

  • Question 421:

    Thomas, a cloud security professional, is performing security assessment on cloud services to identify any loopholes. He detects a vulnerability in a bare-metal cloud server that can enable hackers to implant malicious backdoors in its firmware. He also identified that an installed backdoor can persist even if the server is reallocated to new clients or businesses that use it as an laaS.

    What is the type of cloud attack that can be performed by exploiting the vulnerability discussed in the above scenario?

    A. Man-in-the-cloud (MITC) attack

    B. Cloud cryptojacking

    C. Cloudborne attack

    D. Metadata spoofing attack

  • Question 422:

    Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.

    A. LDAP Injection attack

    B. Cross-Site Scripting (XSS)

    C. SQL injection attack

    D. Cross-Site Request Forgery (CSRF)

  • Question 423:

    In the context of password security, a simple dictionary attack involves loading a dictionary file (a text file full of dictionary words) into a cracking application such as L0phtCrack or John the Ripper, and running it against user accounts located by the application. The larger the word and word fragment selection, the more effective the dictionary attack is. The brute force method is the most inclusive, although slow. It usually tries every possible letter and number combination in its automated exploration. If you would use both brute force and dictionary methods combined together to have variation of words, what would you call such an attack?

    A. Full Blown

    B. Thorough

    C. Hybrid

    D. BruteDics

  • Question 424:

    Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient's consent, similar to email spamming?

    A. Bluesmacking

    B. BlueSniffing

    C. Bluejacking

    D. Bluesnarfing

  • Question 425:

    Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?

    A. ACK flag probe scanning

    B. ICMP Echo scanning

    C. SYN/FIN scanning using IP fragments

    D. IPID scanning

  • Question 426:

    An attacker utilizes a Wi-Fi Pineapple to run an access point with a legitimate-looking SSID for a nearby business in order to capture the wireless password. What kind of attack is this?

    A. MAC spoofing attack

    B. Evil-twin attack

    C. War driving attack

    D. Phishing attack

  • Question 427:

    What did the following commands determine?

    A. That the Joe account has a SID of 500

    B. These commands demonstrate that the guest account has NOT been disabled

    C. These commands demonstrate that the guest account has been disabled

    D. That the true administrator is Joe

    E. Issued alone, these commands prove nothing

  • Question 428:

    Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end- to-end encryption of the connection?

    A. SFTP

    B. Ipsec

    C. SSL

    D. FTPS

  • Question 429:

    in an attempt to increase the security of your network, you Implement a solution that will help keep your

    wireless network undiscoverable and accessible only to those that know It.

    How do you accomplish this?

    A. Delete the wireless network

    B. Remove all passwords

    C. Lock all users

    D. Disable SSID broadcasting

  • Question 430:

    _________ is a type of phishing that targets high-profile executives such as CEOs, CFOs, politicians, and celebrities who have access to confidential and highly valuable information.

    A. Spear phishing

    B. Whaling

    C. Vishing

    D. Phishing

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V11 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.