Cause all that matters here is passing the EC-Council 312-50v11 exam. Cause all that you need is a high score of 312-50v11 Certified Ethical Hacker Exam (CEH v11) exam. The only one thing you need to do is downloading Testking 312-50v11 exam study guides now. We will not let you down with our money-back guarantee.

Online 312-50v11 free questions and answers of New Version:

NEW QUESTION 1
A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0/24. Which of the following has occurred?

  • A. The computer is not using a private IP address.
  • B. The gateway is not routing to a public IP address.
  • C. The gateway and the computer are not on the same network.
  • D. The computer is using an invalid IP address.

Answer: B

NEW QUESTION 2
The company ABC recently contracts a new accountant. The accountant will be working with the financial statements. Those financial statements need to be approved by the CFO and then they will be sent to the accountant but the CFO is worried because he wants to be sure that the information sent to the accountant was not modified once he approved it. Which of the following options can be useful to ensure the integrity of the data?

  • A. The CFO can use a hash algorithm in the document once he approved the financial statements
  • B. The CFO can use an excel file with a password
  • C. The financial statements can be sent twice, one by email and the other delivered in USB and the accountant can compare both to be sure is the same document
  • D. The document can be sent to the accountant using an exclusive USB for that document

Answer: A

NEW QUESTION 3
Which of the following describes the characteristics of a Boot Sector Virus?

  • A. Modifies directory table entries so that directory entries point to the virus code instead of the actual program.
  • B. Moves the MBR to another location on the RAM and copies itself to the original location of the MBR.
  • C. Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR.
  • D. Overwrites the original MBR and only executes the new virus code.

Answer: C

NEW QUESTION 4
Which of the following tools are used for enumeration? (Choose three.)

  • A. SolarWinds
  • B. USER2SID
  • C. Cheops
  • D. SID2USER
  • E. DumpSec

Answer: BDE

NEW QUESTION 5
An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", the user is directed to a phishing site.
Which file does the attacker need to modify?

  • A. Boot.ini
  • B. Sudoers
  • C. Networks
  • D. Hosts

Answer: D

NEW QUESTION 6
Which of the following tools can be used for passive OS fingerprinting?

  • A. nmap
  • B. tcpdump
  • C. tracert
  • D. ping

Answer: B

NEW QUESTION 7
Your company was hired by a small healthcare provider to perform a technical assessment on the network. What is the best approach for discovering vulnerabilities on a Windows-based computer?

  • A. Use the built-in Windows Update tool
  • B. Use a scan tool like Nessus
  • C. Check MITRE.org for the latest list of CVE findings
  • D. Create a disk image of a clean Windows installation

Answer: B

NEW QUESTION 8
You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly.
What is the best Nmap command you will use?

  • A. nmap -T4 -q 10.10.0.0/24
  • B. nmap -T4 -F 10.10.0.0/24
  • C. nmap -T4 -r 10.10.1.0/24
  • D. nmap -T4 -O 10.10.0.0/24

Answer: B

NEW QUESTION 9
Which system consists of a publicly available set of databases that contain domain name registration contact information?

  • A. WHOIS
  • B. CAPTCHA
  • C. IANA
  • D. IETF

Answer: A

NEW QUESTION 10
You are analysing traffic on the network with Wireshark. You want to routinely run a cron job which will run the capture against a specific set of IPs - 192.168.8.0/24. What command you would use?

  • A. wireshark --fetch ''192.168.8*''
  • B. wireshark --capture --local masked 192.168.8.0 ---range 24
  • C. tshark -net 192.255.255.255 mask 192.168.8.0
  • D. sudo tshark -f''net 192 .68.8.0/24''

Answer: D

NEW QUESTION 11
What hacking attack is challenge/response authentication used to prevent?

  • A. Replay attacks
  • B. Scanning attacks
  • C. Session hijacking attacks
  • D. Password cracking attacks

Answer: A

NEW QUESTION 12
A network administrator discovers several unknown files in the root directory of his Linux FTP server. One of the files is a tarball, two are shell script files, and the third is a binary file is named "nc." The FTP server's access logs show that the anonymous user account logged in to the server, uploaded the files, and extracted the contents of the tarball and ran the script using a function provided by the FTP server's software. The “ps” command shows that the “nc” file is running as process, and the netstat command shows the “nc” process is listening on a network port.
What kind of vulnerability must be present to make this remote attack possible?

  • A. File system permissions
  • B. Privilege escalation
  • C. Directory traversal
  • D. Brute force login

Answer: A

NEW QUESTION 13
Yancey is a network security administrator for a large electric company. This company provides power for over 100, 000 people in Las Vegas. Yancey has worked for his company for over 15 years and has become very successful. One day, Yancey comes in to work and finds out that the company will be downsizing and he will be out of a job in two weeks. Yancey is very angry and decides to place logic bombs, viruses, Trojans, and backdoors all over the network to take down the company once he has left. Yancey does not care if his actions land him in jail for 30 or more years, he just wants the company to pay for what they are doing to him.
What would Yancey be considered?

  • A. Yancey would be considered a Suicide Hacker
  • B. Since he does not care about going to jail, he would be considered a Black Hat
  • C. Because Yancey works for the company currently; he would be a White Hat
  • D. Yancey is a Hacktivist Hacker since he is standing up to a company that is downsizing

Answer: A

NEW QUESTION 14
When purchasing a biometric system, one of the considerations that should be reviewed is the processing speed. Which of the following best describes what it is meant by processing?

  • A. The amount of time and resources that are necessary to maintain a biometric system
  • B. How long it takes to setup individual user accounts
  • C. The amount of time it takes to be either accepted or rejected from when an individual provides identification and authentication information
  • D. The amount of time it takes to convert biometric data into a template on a smart card

Answer: C

NEW QUESTION 15
Which utility will tell you in real time which ports are listening or in another state?

  • A. Netstat
  • B. TCPView
  • C. Nmap
  • D. Loki

Answer: B

NEW QUESTION 16
Which results will be returned with the following Google search query? site:target.com – site:Marketing.target.com accounting

  • A. Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting.
  • B. Results matching all words in the query.
  • C. Results for matches on target.com and Marketing.target.com that include the word “accounting”
  • D. Results matching “accounting” in domain target.com but not on the site Marketing.target.com

Answer: D

NEW QUESTION 17
An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the network’s external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file. What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?

  • A. Protocol analyzer
  • B. Network sniffer
  • C. Intrusion Prevention System (IPS)
  • D. Vulnerability scanner

Answer: A

NEW QUESTION 18
What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?

  • A. Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.
  • B. Asymmetric cryptography is computationally expensive in compariso
  • C. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.
  • D. Symmetric encryption allows the server to securely transmit the session keys out-of-band.
  • E. Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.

Answer: D

NEW QUESTION 19
How does a denial-of-service attack work?

  • A. A hacker prevents a legitimate user (or group of users) from accessing a service
  • B. A hacker uses every character, word, or letter he or she can think of to defeat authentication
  • C. A hacker tries to decipher a password by using a system, which subsequently crashes the network
  • D. A hacker attempts to imitate a legitimate user by confusing a computer or even another person

Answer: A

NEW QUESTION 20
Some clients of TPNQM SA were redirected to a malicious site when they tried to access the TPNQM main site. Bob, a system administrator at TPNQM SA, found that they were victims of DNS Cache Poisoning. What should Bob recommend to deal with such a threat?

  • A. The use of security agents in clients’ computers
  • B. The use of DNSSEC
  • C. The use of double-factor authentication
  • D. Client awareness

Answer: B

NEW QUESTION 21
What is the minimum number of network connections in a multi homed firewall?

  • A. 3
  • B. 5
  • C. 4
  • D. 2

Answer: A

NEW QUESTION 22
What kind of detection techniques is being used in antivirus softwares that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it's made on the premiers environment

  • A. VCloud based
  • B. Honypot based
  • C. Behaviour based
  • D. Heuristics based

Answer: A

NEW QUESTION 23
......

Recommend!! Get the Full 312-50v11 dumps in VCE and PDF From Thedumpscentre.com, Welcome to Download: https://www.thedumpscentre.com/312-50v11-dumps/ (New 254 Q&As Version)