
Exam Code: 312-50v11 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Certified Ethical Hacker Exam (CEH v11)
Certification Provider: EC-Council
Free Today! Guaranteed Training- Pass 312-50v11 Exam.
Also have 312-50v11 free dumps questions for you:
NEW QUESTION 1
What hacking attack is challenge/response authentication used to prevent?
Answer: A
NEW QUESTION 2
In the context of password security, a simple dictionary attack involves loading a dictionary file (a text file full of dictionary words) into a cracking application such as L0phtCrack or John the Ripper, and running it against user accounts located by the application. The larger the word and word fragment selection, the more effective the dictionary attack is. The brute force method is the most inclusive, although slow. It usually tries every possible letter and number combination in its automated exploration. If you would use both brute force and dictionary methods combined together to have variation of words, what would you call such an attack?
Answer: C
NEW QUESTION 3
One of your team members has asked you to analyze the following SOA record.
What is the TTL? Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.)
Answer: D
NEW QUESTION 4
An attacker attaches a rogue router in a network. He wants to redirect traffic to a LAN attached to his router as part of a man-in-the-middle attack. What measure on behalf of the legitimate admin can mitigate this attack?
Answer: A
NEW QUESTION 5
How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?
Answer: B
NEW QUESTION 6
The establishment of a TCP connection involves a negotiation called three-way handshake. What type of message does the client send to the server in order to begin this negotiation?
Answer: B
NEW QUESTION 7
Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.
Answer: B
NEW QUESTION 8
One of your team members has asked you to analyze the following SOA record. What is the version? Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.) (Choose four.)
Answer: A
NEW QUESTION 9
Why should the security analyst disable/remove unnecessary ISAPI filters?
Answer: B
NEW QUESTION 10
Some clients of TPNQM SA were redirected to a malicious site when they tried to access the TPNQM main site. Bob, a system administrator at TPNQM SA, found that they were victims of DNS Cache Poisoning. What should Bob recommend to deal with such a threat?
Answer: B
NEW QUESTION 11
“........is an attack type for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications. It is the wireless version of the phishing scam. An attacker fools wireless users into connecting a laptop or mobile phone to a tainted hot-spot by posing as a legitimate provider. This type of attack may be used to steal the passwords of
unsuspecting users by either snooping the communication link or by phishing, which involves setting up a fraudulent web site and luring people there.”
Fill in the blank with appropriate choice.
Answer: A
NEW QUESTION 12
You are trying to break into a highly classified top-secret mainframe computer with highest security system in place at Merclyn Barley Bank located in Los Angeles.
You know that conventional hacking doesn't work in this case, because organizations such as banks are generally tight and secure when it comes to protecting their systems.
In other words, you are trying to penetrate an otherwise impenetrable system. How would you proceed?
Answer: B
NEW QUESTION 13
You are programming a buffer overflow exploit and you want to create a NOP sled of 200 bytes in the program exploit.c
What is the hexadecimal value of NOP instruction?
Answer: D
NEW QUESTION 14
When discussing passwords, what is considered a brute force attack?
Answer: A
NEW QUESTION 15
What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?
Answer: A
NEW QUESTION 16
Which of the following is the structure designed to verify and authenticate the identity of individuals within the enterprise taking part in a data exchange?
Answer: D
NEW QUESTION 17
Which Intrusion Detection System is the best applicable for large environments where critical assets on the network need extra scrutiny and is ideal for observing sensitive network segments?
Answer: C
NEW QUESTION 18
During the process of encryption and decryption, what keys are shared? During the process of encryption and decryption, what keys are shared?
Answer: C
NEW QUESTION 19
Fingerprinting an Operating System helps a cracker because:
Answer: D
NEW QUESTION 20
If you want to only scan fewer ports than the default scan using Nmap tool, which option would you use?
Answer: B
NEW QUESTION 21
......
Recommend!! Get the Full 312-50v11 dumps in VCE and PDF From Certshared, Welcome to Download: https://www.certshared.com/exam/312-50v11/ (New 254 Q&As Version)