Exam Details

  • Exam Code
    :312-50V11
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v11)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :528 Q&As
  • Last Updated
    :Apr 09, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V11 Questions & Answers

  • Question 61:

    The "Gray-box testing" methodology enforces what kind of restriction?

    A. Only the external operation of a system is accessible to the tester.

    B. The internal operation of a system in only partly accessible to the tester.

    C. Only the internal operation of a system is known to the tester.

    D. The internal operation of a system is completely known to the tester.

  • Question 62:

    Bob is doing a password assessment for one of his clients. Bob suspects that security policies are not in place. He also suspects that weak passwords are probably the norm throughout the company he is evaluating. Bob is familiar with password weaknesses and key loggers.

    Which of the following options best represents the means that Bob can adopt to retrieve passwords from his clients hosts and servers?

    A. Hardware, Software, and Sniffing.

    B. Hardware and Software Keyloggers.

    C. Passwords are always best obtained using Hardware key loggers.

    D. Software only, they are the most effective.

  • Question 63:

    Password cracking programs reverse the hashing process to recover passwords.(True/False.)

    A. True

    B. False

  • Question 64:

    While browsing his Facebook teed, Matt sees a picture one of his friends posted with the caption. "Learn more about your friends!", as well as a number of personal questions. Matt is suspicious and texts his friend, who confirms that he did indeed post it. With assurance that the post is legitimate. Matt responds to the questions on the post, a few days later. Mates bank account has been accessed, and the password has been changed. What most likely happened?

    A. Matt inadvertently provided the answers to his security questions when responding to the post.

    B. Matt's bank-account login information was brute forced.

    C. Matt Inadvertently provided his password when responding to the post.

    D. Matt's computer was infected with a keylogger.

  • Question 65:

    You have compromised a server and successfully gained a root access. You want to pivot and pass traffic undetected over the network and evade any possible Intrusion Detection System. What is the best approach?

    A. Use Alternate Data Streams to hide the outgoing packets from this server.

    B. Use HTTP so that all traffic can be routed vis a browser, thus evading the internal Intrusion Detection Systems.

    C. Install Cryptcat and encrypt outgoing packets from this server.

    D. Install and use Telnet to encrypt all outgoing traffic from this server.

  • Question 66:

    Elante company has recently hired James as a penetration tester. He was tasked with performing

    enumeration on an organization's network. In the process of enumeration, James discovered a service that

    is accessible to external sources.

    This service runs directly on port 21. What is the service enumerated byjames in the above scenario?

    A. Border Gateway Protocol (BGP)

    B. File Transfer Protocol (FTP)

    C. Network File System (NFS)

    D. Remote procedure call (RPC)

  • Question 67:

    Why containers are less secure that virtual machines?

    A. Host OS on containers has a larger surface attack.

    B. Containers may full fill disk space of the host.

    C. A compromise container may cause a CPU starvation of the host.

    D. Containers are attached to the same virtual network.

  • Question 68:

    Gilbert, a web developer, uses a centralized web API to reduce complexity and increase the Integrity of updating and changing data. For this purpose, he uses a web service that uses HTTP methods such as PUT. POST. GET. and DELETE and can improve the overall performance, visibility, scalability, reliability, and portability of an application. What is the type of web-service API mentioned in the above scenario?

    A. JSON-RPC

    B. SOAP API

    C. RESTful API

    D. REST API

  • Question 69:

    An attacker can employ many methods to perform social engineering against unsuspecting employees, including scareware.

    What is the best example of a scareware attack?

    A. A pop-up appears to a user stating, "You have won a free cruise! Click here to claim your prize!"

    B. A banner appears to a user stating, "Your account has been locked. Click here to reset your password and unlock your account."

    C. A banner appears to a user stating, "Your Amazon order has been delayed. Click here to find out your new delivery date."

    D. A pop-up appears to a user stating, "Your computer may have been infected with spyware. Click here to install an anti-spyware tool to resolve this issue."

  • Question 70:

    You are attempting to crack LM Manager hashed from Windows 2000 SAM file. You will be using LM Brute force hacking tool for decryption. What encryption algorithm will you be decrypting?

    A. MD4

    B. DES

    C. SHA

    D. SSL

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V11 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.