It is impossible to pass EC-Council 312-50v11 exam without any help in the short term. Come to Certleader soon and find the most advanced, correct and guaranteed EC-Council 312-50v11 practice questions. You will get a surprising result by our Down to date Certified Ethical Hacker Exam (CEH v11) practice guides.

Free demo questions for EC-Council 312-50v11 Exam Dumps Below:

NEW QUESTION 1
You work for Acme Corporation as Sales Manager. The company has tight network security restrictions. You are trying to steal data from the company's Sales database (Sales.xls) and transfer them to your home computer. Your company filters and monitors traffic that leaves from the internal network to the Internet. How will you achieve this without raising suspicion?

  • A. Encrypt the Sales.xls using PGP and e-mail it to your personal gmail account
  • B. Package the Sales.xls using Trojan wrappers and telnet them back your home computer
  • C. You can conceal the Sales.xls database in another file like photo.jpg or other files and send it out in an innocent looking email or file transfer using Steganography techniques
  • D. Change the extension of Sales.xls to sales.txt and upload them as attachment to your hotmail account

Answer: C

NEW QUESTION 2
What did the following commands determine?
312-50v11 dumps exhibit

  • A. That the Joe account has a SID of 500
  • B. These commands demonstrate that the guest account has NOT been disabled
  • C. These commands demonstrate that the guest account has been disabled
  • D. That the true administrator is Joe
  • E. Issued alone, these commands prove nothing

Answer: D

NEW QUESTION 3
If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?

  • A. Birthday
  • B. Brute force
  • C. Man-in-the-middle
  • D. Smurf

Answer: B

NEW QUESTION 4
Every company needs a formal written document which spells out to employees precisely what they are allowed to use the company's systems for, what is prohibited, and what will happen to them if they break the rules. Two printed copies of the policy should be given to every employee as soon as possible after they join the organization. The employee should be asked to sign one copy, which should be safely filed by the company. No one should be allowed to use the company's computer systems until they have signed the policy in acceptance of its terms.
What is this document called?

  • A. Information Audit Policy (IAP)
  • B. Information Security Policy (ISP)
  • C. Penetration Testing Policy (PTP)
  • D. Company Compliance Policy (CCP)

Answer: B

NEW QUESTION 5
Why is a penetration test considered to be more thorough than vulnerability scan?

  • A. Vulnerability scans only do host discovery and port scanning by default.
  • B. A penetration test actively exploits vulnerabilities in the targeted infrastructure, while a vulnerability scan does not typically involve active exploitation.
  • C. It is not – a penetration test is often performed by an automated tool, while a vulnerability scan requires active engagement.
  • D. The tools used by penetration testers tend to have much more comprehensive vulnerability databases.

Answer: B

NEW QUESTION 6
In the field of cryptanalysis, what is meant by a “rubber-hose” attack?

  • A. Forcing the targeted keystream through a hardware-accelerated device such as an ASIC.
  • B. A backdoor placed into a cryptographic algorithm by its creator.
  • C. Extraction of cryptographic secrets through coercion or torture.
  • D. Attempting to decrypt ciphertext by making logical assumptions about the contents of the original plaintext.

Answer: C

NEW QUESTION 7
Your company performs penetration tests and security assessments for small and medium-sized business in the local area. During a routine security assessment, you discover information that suggests your client is involved with human trafficking.
What should you do?

  • A. Confront the client in a respectful manner and ask her about the data.
  • B. Copy the data to removable media and keep it in case you need it.
  • C. Ignore the data and continue the assessment until completed as agreed.
  • D. Immediately stop work and contact the proper legal authorities.

Answer: D

NEW QUESTION 8
Which regulation defines security and privacy controls for Federal information systems and organizations?

  • A. HIPAA
  • B. EU Safe Harbor
  • C. PCI-DSS
  • D. NIST-800-53

Answer: D

NEW QUESTION 9
You went to great lengths to install all the necessary technologies to prevent hacking attacks, such as expensive firewalls, antivirus software, anti-spam systems and intrusion detection/prevention tools in your company's network. You have configured the most secure policies and tightened every device on your network. You are confident that hackers will never be able to gain access to your network with complex security system in place.
Your peer, Peter Smith who works at the same department disagrees with you.
He says even the best network security technologies cannot prevent hackers gaining access to the network because of presence of "weakest link" in the security chain.
What is Peter Smith talking about?

  • A. Untrained staff or ignorant computer users who inadvertently become the weakest link in your securitychain
  • B. "zero-day" exploits are the weakest link in the security chain since the IDS will not be able to detect these attacks
  • C. "Polymorphic viruses" are the weakest link in the security chain since the Anti-Virus scanners will not be able to detect these attacks
  • D. Continuous Spam e-mails cannot be blocked by your security system since spammers use different techniques to bypass the filters in your gateway

Answer: A

NEW QUESTION 10
While performing online banking using a Web browser, a user receives an email that contains a link to an interesting Web site. When the user clicks on the link, another Web browser session starts and displays a video of cats playing a piano. The next business day, the user receives what looks like an email from his bank, indicating that his bank account has been accessed from a foreign country. The email asks the user to call his bank and verify the authorization of a funds transfer that took place. What Web browser-based security vulnerability was exploited to compromise the user?

  • A. Clickjacking
  • B. Cross-Site Scripting
  • C. Cross-Site Request Forgery
  • D. Web form input validation

Answer: C

NEW QUESTION 11
Which of the following is a command line packet analyzer similar to GUI-based Wireshark?

  • A. nessus
  • B. tcpdump
  • C. ethereal
  • D. jack the ripper

Answer: B

NEW QUESTION 12
A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?

  • A. Perform a vulnerability scan of the system.
  • B. Determine the impact of enabling the audit feature.
  • C. Perform a cost/benefit analysis of the audit feature.
  • D. Allocate funds for staffing of audit log review.

Answer: B

NEW QUESTION 13
The Payment Card Industry Data Security Standard (PCI DSS) contains six different categories of control objectives. Each objective contains one or more requirements, which must be followed in order to achieve compliance. Which of the following requirements would best fit under the objective, "Implement strong access control measures"?

  • A. Regularly test security systems and processes.
  • B. Encrypt transmission of cardholder data across open, public networks.
  • C. Assign a unique ID to each person with computer access.
  • D. Use and regularly update anti-virus software on all systems commonly affected by malware.

Answer: C

NEW QUESTION 14
A company’s policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department. Using Wireshark to examine the captured traffic, which command can be used as display filter to find unencrypted file transfers?

  • A. tcp.port = = 21
  • B. tcp.port = 23
  • C. tcp.port = = 21 | | tcp.port = =22
  • D. tcp.port ! = 21

Answer: A

NEW QUESTION 15
What type of analysis is performed when an attacker has partial knowledge of inner-workings of the application?

  • A. Black-box
  • B. Announced
  • C. White-box
  • D. Grey-box

Answer: D

NEW QUESTION 16
You are trying to break into a highly classified top-secret mainframe computer with highest security system in place at Merclyn Barley Bank located in Los Angeles.
You know that conventional hacking doesn't work in this case, because organizations such as banks are generally tight and secure when it comes to protecting their systems.
In other words, you are trying to penetrate an otherwise impenetrable system. How would you proceed?

  • A. Look for "zero-day" exploits at various underground hacker websites in Russia and China and buy the necessary exploits from these hackers and target the bank's network
  • B. Try to hang around the local pubs or restaurants near the bank, get talking to a poorly-paid or disgruntled employee, and offer them money if they'll abuse their access privileges by providing you with sensitive information
  • C. Launch DDOS attacks against Merclyn Barley Bank's routers and firewall systems using 100, 000 or more "zombies" and "bots"
  • D. Try to conduct Man-in-the-Middle (MiTM) attack and divert the network traffic going to the Merclyn Barley Bank's Webserver to that of your machine using DNS Cache Poisoning techniques

Answer: B

NEW QUESTION 17
Which of the following program infects the system boot sector and the executable files at the same time?

  • A. Polymorphic virus
  • B. Stealth virus
  • C. Multipartite Virus
  • D. Macro virus

Answer: C

NEW QUESTION 18
By using a smart card and pin, you are using a two-factor authentication that satisfies

  • A. Something you are and something you remember
  • B. Something you have and something you know
  • C. Something you know and something you are
  • D. Something you have and something you are

Answer: B

NEW QUESTION 19
This TCP flag instructs the sending system to transmit all buffered data immediately.

  • A. SYN
  • B. RST
  • C. PSH
  • D. URG
  • E. FIN

Answer: C

NEW QUESTION 20
You are working as a Security Analyst in a company XYZ that owns the whole subnet range of 23.0.0.0/8 and 192.168.0.0/8.
While monitoring the data, you find a high number of outbound connections. You see that IP’s owned by XYZ (Internal) and private IP’s are communicating to a Single Public IP. Therefore, the Internal IP’s are sending data to the Public IP.
After further analysis, you find out that this Public IP is a blacklisted IP, and the internal communicating devices are compromised.
What kind of attack does the above scenario depict?

  • A. Botnet Attack
  • B. Spear Phishing Attack
  • C. Advanced Persistent Threats
  • D. Rootkit Attack

Answer: A

NEW QUESTION 21
The “Gray-box testing” methodology enforces what kind of restriction?

  • A. Only the external operation of a system is accessible to the tester.
  • B. The internal operation of a system in only partly accessible to the tester.
  • C. Only the internal operation of a system is known to the tester.
  • D. The internal operation of a system is completely known to the tester.

Answer: B

NEW QUESTION 22
Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.

  • A. LDAP Injection attack
  • B. Cross-Site Scripting (XSS)
  • C. SQL injection attack
  • D. Cross-Site Request Forgery (CSRF)

Answer: B

NEW QUESTION 23
......

Recommend!! Get the Full 312-50v11 dumps in VCE and PDF From 2passeasy, Welcome to Download: https://www.2passeasy.com/dumps/312-50v11/ (New 254 Q&As Version)