Exam Details

  • Exam Code
    :312-50V11
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v11)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :528 Q&As
  • Last Updated
    :Apr 09, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V11 Questions & Answers

  • Question 461:

    What two conditions must a digital signature meet?

    A. Has to be the same number of characters as a physical signature and must be unique.

    B. Has to be unforgeable, and has to be authentic.

    C. Must be unique and have special characters.

    D. Has to be legible and neat.

  • Question 462:

    Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?

    A. 113

    B. 69

    C. 123

    D. 161

  • Question 463:

    When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of the SYN/ACK before the connection is established. This is referred to as the "TCP three-way handshake." While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK.

    How would an attacker exploit this design by launching TCP SYN attack?

    A. Attacker generates TCP SYN packets with random destination addresses towards a victim host

    B. Attacker floods TCP SYN packets with random source addresses towards a victim host

    C. Attacker generates TCP ACK packets with random source addresses towards a victim host

    D. Attacker generates TCP RST packets with random source addresses towards a victim host

  • Question 464:

    What is GINA?

    A. Gateway Interface Network Application

    B. GUI Installed Network Application CLASS

    C. Global Internet National Authority (G-USA)

    D. Graphical Identification and Authentication DLL

  • Question 465:

    Josh has finished scanning a network and has discovered multiple vulnerable services. He knows that several of these usually have protections against external sources but are frequently susceptible to internal users. He decides to draft an email, spoof the sender as the internal IT team, and attach a malicious file disguised as a financial spreadsheet. Before Josh sends the email, he decides to investigate other methods of getting the file onto the system. For this particular attempt, what was the last stage of the cyber kill chain that Josh performed?

    A. Exploitation

    B. Weaponization

    C. Delivery

    D. Reconnaissance

  • Question 466:

    Study the following log extract and identify the attack.

    A. Hexcode Attack

    B. Cross Site Scripting

    C. Multiple Domain Traversal Attack

    D. Unicode Directory Traversal Attack

  • Question 467:

    Mason, a professional hacker, targets an organization and spreads Emotet malware through malicious script. After infecting the victim's device. Mason further used Emotet to spread the infection across local networks and beyond to compromise as many machines as possible. In this process, he used a tool, which is a self-extracting RAR file, to retrieve information related to network resources such as writable share drives. What is the tool employed by Mason in the above scenario?

    A. NetPass.exe

    B. Outlook scraper

    C. WebBrowserPassView

    D. Credential enumerator

  • Question 468:

    A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?

    A. Perform a vulnerability scan of the system.

    B. Determine the impact of enabling the audit feature.

    C. Perform a cost/benefit analysis of the audit feature.

    D. Allocate funds for staffing of audit log review.

  • Question 469:

    Bob wants to ensure that Alice can check whether his message has been tampered with. He creates a checksum of the message and encrypts it using asymmetric cryptography. What key does Bob use to encrypt the checksum for accomplishing this goal?

    A. Alice's private key

    B. Alice's public key

    C. His own private key

    D. His own public key

  • Question 470:

    Wilson, a professional hacker, targets an organization for financial benefit and plans to compromise its systems by sending malicious emails. For this purpose, he uses a tool to track the emails of the target and extracts information such as sender identities, mall servers, sender IP addresses, and sender locations from different public sources. He also checks if an email address was leaked using the haveibeenpwned.com API. Which of the following tools is used by Wilson in the above scenario?

    A. Factiva

    B. Netcraft

    C. infoga

    D. Zoominfo

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V11 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.