Exam Details

  • Exam Code
    :312-50V11
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v11)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :528 Q&As
  • Last Updated
    :Apr 09, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V11 Questions & Answers

  • Question 441:

    You are a penetration tester tasked with testing the wireless network of your client Brakeme SA. You are attempting to break into the wireless network with the SSID "Brakeme-lnternal." You realize that this network uses WPA3 encryption, which of the following vulnerabilities is the promising to exploit?

    A. Dragonblood

    B. Cross-site request forgery

    C. Key reinstallation attack

    D. AP Myconfiguration

  • Question 442:

    in the Common Vulnerability Scoring System (CVSS) v3.1 severity ratings, what range does medium vulnerability fall in?

    A. 3.0-6.9

    B. 40-6.0

    C. 4.0-6.9

    D. 3.9-6.9

  • Question 443:

    Richard, an attacker, targets an MNC. in this process, he uses a footprinting technique to gather as much information as possible. Using this technique, he gathers domain information such as the target domain name, contact details of its owner, expiry date, and creation date. With this information, he creates a map of the organization's network and misleads domain owners with social engineering to obtain internal details of its network. What type of footprinting technique is employed by Richard?

    A. VoIP footprinting

    B. VPN footprinting

    C. Whois footprinting

    D. Email footprinting

  • Question 444:

    Jude, a pen tester working in Keiltech Ltd., performs sophisticated security testing on his company's network infrastructure to identify security loopholes. In this process, he started to circumvent the network protection tools and firewalls used in the company. He employed a technique that can create forged TCP sessions by carrying out multiple SYN, ACK, and RST or FIN packets. Further, this process allowed Jude to execute DDoS attacks that can exhaust the network resources. What is the attack technique used by Jude for finding loopholes in the above scenario?

    A. UDP flood attack

    B. Ping-of-death attack

    C. Spoofed session flood attack

    D. Peer-to-peer attack

  • Question 445:

    Which of the following allows attackers to draw a map or outline the target organization's network infrastructure to know about the actual environment that they are going to hack.

    A. Enumeration

    B. Vulnerability analysis

    C. Malware analysis

    D. Scanning networks

  • Question 446:

    Websites and web portals that provide web services commonly use the Simple Object Access Protocol (SOAP).

    Which of the following is an incorrect definition or characteristics of the protocol?

    A. Exchanges data between web services

    B. Only compatible with the application protocol HTTP

    C. Provides a structured model for messaging

    D. Based on XML

  • Question 447:

    What does the following command in netcat do? nc -l -u -p55555 < /etc/passwd

    A. logs the incoming connections to /etc/passwd file

    B. loads the /etc/passwd file to the UDP port 55555

    C. grabs the /etc/passwd file when connected to UDP port 55555

    D. deletes the /etc/passwd file when connected to the UDP port 55555

  • Question 448:

    A newly joined employee. Janet, has been allocated an existing system used by a previous employee. Before issuing the system to Janet, it was assessed by Martin, the administrator. Martin found that there were possibilities of compromise through user directories, registries, and other system parameters. He also Identified vulnerabilities such as native configuration tables, incorrect registry or file permissions, and software configuration errors. What is the type of vulnerability assessment performed by Martin?

    A. Credentialed assessment

    B. Database assessment

    C. Host-based assessment

    D. Distributed assessment

  • Question 449:

    Which rootkit is characterized by its function of adding code and/or replacing some of the operating-system kernel code to obscure a backdoor on a system?

    A. User-mode rootkit

    B. Library-level rootkit

    C. Kernel-level rootkit

    D. Hypervisor-level rootkit

  • Question 450:

    Which DNS resource record can indicate how long any "DNS poisoning" could last?

    A. MX

    B. SOA

    C. NS

    D. TIMEOUT

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V11 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.