Approved EC-Council 312-50v11 Exams Online

It is more faster and easier to pass the EC-Council 312-50v11 exam by using Approved EC-Council Certified Ethical Hacker Exam (CEH v11) questuins and answers. Immediate access to the Leading 312-50v11 Exam and find the same core area 312-50v11 questions with professionally verified answers, then PASS your exam with a high score now.

Free demo questions for EC-Council 312-50v11 Exam Dumps Below:

NEW QUESTION 1
You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet. What is the recommended architecture in terms of server placement?

  • A. All three servers need to be placed internally
  • B. A web server facing the Internet, an application server on the internal network, a database server on the internal network
  • C. A web server and the database server facing the Internet, an application server on the internal network
  • D. All three servers need to face the Internet so that they can communicate between themselves

Answer: B

NEW QUESTION 2
What is the following command used for? net use \targetipc$ "" /u:""

  • A. Grabbing the etc/passwd file
  • B. Grabbing the SAM
  • C. Connecting to a Linux computer through Samba.
  • D. This command is used to connect as a null session
  • E. Enumeration of Cisco routers

Answer: D

NEW QUESTION 3
Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?

  • A. Kismet
  • B. Abel
  • C. Netstumbler
  • D. Nessus

Answer: A

NEW QUESTION 4
When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of the SYN/ACK before the connection is established. This is referred to as the "TCP three-way handshake." While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK.
How would an attacker exploit this design by launching TCP SYN attack?

  • A. Attacker generates TCP SYN packets with random destination addresses towards a victim host
  • B. Attacker floods TCP SYN packets with random source addresses towards a victim host
  • C. Attacker generates TCP ACK packets with random source addresses towards a victim host
  • D. Attacker generates TCP RST packets with random source addresses towards a victim host

Answer: B

NEW QUESTION 5
You receive an e-mail like the one shown below. When you click on the link contained in the mail, you are redirected to a website seeking you to download free Anti-Virus software.
Dear valued customers,
We are pleased to announce the newest version of Antivirus 2010 for Windows which will probe you with total security against the latest spyware, malware, viruses, Trojans and other online threats. Simply visit the link below and enter your antivirus code:
312-50v11 dumps exhibit
or you may contact us at the following address: Media Internet Consultants, Edif. Neptuno, Planta
Baja, Ave. Ricardo J. Alfaro, Tumba Muerto, n/a Panama
How will you determine if this is Real Anti-Virus or Fake Anti-Virus website?

  • A. Look at the website design, if it looks professional then it is a Real Anti-Virus website
  • B. Connect to the site using SSL, if you are successful then the website is genuine
  • C. Search using the URL and Anti-Virus product name into Google and lookout for suspicious warnings against this site
  • D. Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware
  • E. Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware

Answer: C

NEW QUESTION 6
env x=’(){ :;};echo exploit’ bash –c ‘cat/etc/passwd’
What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?

  • A. Removes the passwd file
  • B. Changes all passwords in passwd
  • C. Add new user to the passwd file
  • D. Display passwd content to prompt

Answer: D

NEW QUESTION 7
When discussing passwords, what is considered a brute force attack?

  • A. You attempt every single possibility until you exhaust all possible combinations or discover the password
  • B. You threaten to use the rubber hose on someone unless they reveal their password
  • C. You load a dictionary of words into your cracking program
  • D. You create hashes of a large number of words and compare it with the encrypted passwords
  • E. You wait until the password expires

Answer: A

NEW QUESTION 8
What kind of detection techniques is being used in antivirus softwares that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it's made on the premiers environment

  • A. VCloud based
  • B. Honypot based
  • C. Behaviour based
  • D. Heuristics based

Answer: A

NEW QUESTION 9
Which system consists of a publicly available set of databases that contain domain name registration contact information?

  • A. WHOIS
  • B. CAPTCHA
  • C. IANA
  • D. IETF

Answer: A

NEW QUESTION 10
When you are getting information about a web server, it is very important to know the HTTP Methods (GET, POST, HEAD, PUT, DELETE, TRACE) that are available because there are two critical methods (PUT and DELETE). PUT can upload a file to the server and DELETE can delete a file from the server. You can detect all these methods (GET, POST, HEAD, DELETE, PUT, TRACE) using NMAP script engine. What Nmap script will help you with this task?

  • A. http-methods
  • B. http enum
  • C. http-headers
  • D. http-git

Answer: A

NEW QUESTION 11
Why containers are less secure that virtual machines?

  • A. Host OS on containers has a larger surface attack.
  • B. Containers may full fill disk space of the host.
  • C. A compromise container may cause a CPU starvation of the host.
  • D. Containers are attached to the same virtual network.

Answer: A

NEW QUESTION 12
Due to a slowdown of normal network operations, the IT department decided to monitor internet traffic for all of the employees. From a legal standpoint, what would be troublesome to take this kind of measure?

  • A. All of the employees would stop normal work activities
  • B. IT department would be telling employees who the boss is
  • C. Not informing the employees that they are going to be monitored could be an invasion of privacy.
  • D. The network could still experience traffic slow down.

Answer: C

NEW QUESTION 13
Which of the following is the best countermeasure to encrypting ransomwares?

  • A. Use multiple antivirus softwares
  • B. Pay a ransom
  • C. Keep some generation of off-line backup
  • D. Analyze the ransomware to get decryption key of encrypted data

Answer: C

NEW QUESTION 14
How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?

  • A. There is no way to tell because a hash cannot be reversed
  • B. The right most portion of the hash is always the same
  • C. The hash always starts with AB923D
  • D. The left most portion of the hash is always the same
  • E. A portion of the hash will be all 0's

Answer: B

NEW QUESTION 15
Study the snort rule given below:
312-50v11 dumps exhibit
From the options below, choose the exploit against which this rule applies.

  • A. WebDav
  • B. SQL Slammer
  • C. MS Blaster
  • D. MyDoom

Answer: C

NEW QUESTION 16
Eve is spending her day scanning the library computers. She notices that Alice is using a computer whose port 445 is active and listening. Eve uses the ENUM tool to enumerate Alice machine. From the command prompt, she types the following command.
312-50v11 dumps exhibit
What is Eve trying to do?

  • A. Eve is trying to connect as a user with Administrator privileges
  • B. Eve is trying to enumerate all users with Administrative privileges
  • C. Eve is trying to carry out a password crack for user Administrator
  • D. Eve is trying to escalate privilege of the null user to that of Administrator

Answer: C

NEW QUESTION 17
An attacker is trying to redirect the traffic of a small office. That office is using their own mail server, DNS server and NTP server because of the importance of their job. The attacker gain access to the DNS server and redirect the direction www.google.com to his own IP address. Now when the employees of the office want to go to Google they are being redirected to the attacker machine. What is the name of this kind of attack?

  • A. MAC Flooding
  • B. Smurf Attack
  • C. DNS spoofing
  • D. ARP Poisoning

Answer: C

NEW QUESTION 18
Some clients of TPNQM SA were redirected to a malicious site when they tried to access the TPNQM main site. Bob, a system administrator at TPNQM SA, found that they were victims of DNS Cache Poisoning. What should Bob recommend to deal with such a threat?

  • A. The use of security agents in clients’ computers
  • B. The use of DNSSEC
  • C. The use of double-factor authentication
  • D. Client awareness

Answer: B

NEW QUESTION 19
John the Ripper is a technical assessment tool used to test the weakness of which of the following?

  • A. Passwords
  • B. File permissions
  • C. Firewall rulesets
  • D. Usernames

Answer: A

NEW QUESTION 20
An attacker runs netcat tool to transfer a secret file between two hosts.
312-50v11 dumps exhibit
He is worried about information being sniffed on the network.
How would the attacker use netcat to encrypt the information before transmitting onto the wire?

  • A. Machine A: netcat -l -p -s password 1234 < testfileMachine B: netcat <machine A IP> 1234
  • B. Machine A: netcat -l -e magickey -p 1234 < testfileMachine B: netcat <machine A IP> 1234
  • C. Machine A: netcat -l -p 1234 < testfile -pw passwordMachine B: netcat <machine A IP> 1234 -pw password
  • D. Use cryptcat instead of netcat

Answer: D

NEW QUESTION 21
What is the known plaintext attack used against DES which gives the result that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single key?

  • A. Man-in-the-middle attack
  • B. Meet-in-the-middle attack
  • C. Replay attack
  • D. Traffic analysis attack

Answer: B

NEW QUESTION 22
A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server. Based on this information, what should be one of your key recommendations to the bank?

  • A. Place a front-end web server in a demilitarized zone that only handles external web traffic
  • B. Require all employees to change their anti-virus program with a new one
  • C. Move the financial data to another server on the same IP subnet
  • D. Issue new certificates to the web servers from the root certificate authority

Answer: A

NEW QUESTION 23
How does a denial-of-service attack work?

  • A. A hacker prevents a legitimate user (or group of users) from accessing a service
  • B. A hacker uses every character, word, or letter he or she can think of to defeat authentication
  • C. A hacker tries to decipher a password by using a system, which subsequently crashes the network
  • D. A hacker attempts to imitate a legitimate user by confusing a computer or even another person

Answer: A

NEW QUESTION 24
What does the –oX flag do in an Nmap scan?

  • A. Perform an eXpress scan
  • B. Output the results in truncated format to the screen
  • C. Output the results in XML format to a file
  • D. Perform an Xmas scan

Answer: C

NEW QUESTION 25
What is the purpose of a demilitarized zone on a network?

  • A. To scan all traffic coming through the DMZ to the internal network
  • B. To only provide direct access to the nodes within the DMZ and protect the network behind it
  • C. To provide a place to put the honeypot
  • D. To contain the network devices you wish to protect

Answer: B

NEW QUESTION 26
......

Recommend!! Get the Full 312-50v11 dumps in VCE and PDF From Dumpscollection.com, Welcome to Download: https://www.dumpscollection.net/dumps/312-50v11/ (New 254 Q&As Version)