Exam Details

  • Exam Code
    :312-50V11
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v11)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :528 Q&As
  • Last Updated
    :Apr 09, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V11 Questions & Answers

  • Question 451:

    An attacker decided to crack the passwords used by industrial control systems. In this process, he employed a loop strategy to recover these passwords. He used one character at a time to check whether the first character entered is correct; if so, he continued the loop for consecutive characters. If not, he terminated the loop. Furthermore, the attacker checked how much time the device took to finish one complete password authentication process, through which he deduced how many characters entered are correct.

    What is the attack technique employed by the attacker to crack the passwords of the industrial control systems?

    A. Side-channel attack

    B. Denial-of-service attack

    C. HMI-based attack

    D. Buffer overflow attack

  • Question 452:

    Internet Protocol Security IPsec is actually a suite pf protocols. Each protocol within the suite provides different functionality. Collective IPsec does everything except.

    A. Protect the payload and the headers

    B. Encrypt

    C. Work at the Data Link Layer

    D. Authenticate

  • Question 453:

    Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students.

    He identified this when the IDS alerted for malware activities in the network. What should Bob do to avoid this problem?

    A. Disable unused ports in the switches

    B. Separate students in a different VLAN

    C. Use the 802.1x protocol

    D. Ask students to use the wireless network

  • Question 454:

    Morris, a professional hacker, performed a vulnerability scan on a target organization by sniffing the traffic on the network lo identify the active systems, network services, applications, and vulnerabilities. He also obtained the list of the users who are currently accessing the network. What is the type of vulnerability assessment that Morris performed on the target organization?

    A. internal assessment

    B. Passive assessment

    C. External assessment

    D. Credentialed assessment

  • Question 455:

    Which of the following types of SQL injection attacks extends the results returned by the original query, enabling attackers to run two or more statements if they have the same structure as the original one?

    A. Error-based injection

    B. Boolean-based blind SQL injection

    C. Blind SQL injection

    D. Union SQL injection

  • Question 456:

    An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?

    A. Reverse Social Engineering

    B. Tailgating

    C. Piggybacking

    D. Announced

  • Question 457:

    To invisibly maintain access to a machine, an attacker utilizes a toolkit that sits undetected In the core components of the operating system. What is this type of rootkit an example of?

    A. Mypervisor rootkit

    B. Kernel toolkit

    C. Hardware rootkit

    D. Firmware rootkit

  • Question 458:

    joe works as an it administrator in an organization and has recently set up a cloud computing service for the organization. To implement this service, he reached out to a telecom company for providing Internet connectivity and transport services between the organization and the cloud service provider, in the NIST cloud deployment reference architecture, under which category does the telecom company fall in the above scenario?

    A. Cloud booker

    B. Cloud consumer

    C. Cloud carrier

    D. Cloud auditor

  • Question 459:

    The establishment of a TCP connection involves a negotiation called three-way handshake. What type of message does the client send to the server in order to begin this negotiation?

    A. ACK

    B. SYN

    C. RST

    D. SYN-ACK

  • Question 460:

    You receive an e-mail like the one shown below. When you click on the link contained in the mail, you are redirected to a website seeking you to download free Anti-Virus software.

    Dear valued customers,

    We are pleased to announce the newest version of Antivirus 2010 for Windows which will probe you with total security against the latest spyware, malware, viruses, Trojans and other online threats. Simply visit the link below and enter your antivirus code:

    or you may contact us at the following address: Media Internet Consultants, Edif. Neptuno, Planta Baja, Ave. Ricardo J. Alfaro, Tumba Muerto, n/a Panama How will you determine if this is Real Anti-Virus

    or Fake Anti-Virus website?

    A. Look at the website design, if it looks professional then it is a Real Anti-Virus website

    B. Connect to the site using SSL, if you are successful then the website is genuine

    C. Search using the URL and Anti-Virus product name into Google and lookout for suspicious warnings against this site

    D. Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware

    E. Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V11 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.