Leads4pass > EC-COUNCIL > CEH v11 > 312-50V11 > 312-50V11 Online Practice Questions and Answers

312-50V11 Online Practice Questions and Answers

Questions 4

How can rainbow tables be defeated?

A. Use of non-dictionary words

B. All uppercase character passwords

C. Password salting

D. Lockout accounts under brute force password cracking attempts

Buy Now
Questions 5

What information security law or standard aims at protecting stakeholders and the general public from accounting errors and fraudulent activities within organizations?

A. PCI-DSS

B. FISMA

C. SOX

D. ISO/I EC 27001:2013

Buy Now
Questions 6

A newly joined employee. Janet, has been allocated an existing system used by a previous employee. Before issuing the system to Janet, it was assessed by Martin, the administrator. Martin found that there were possibilities of compromise through user directories, registries, and other system parameters. He also Identified vulnerabilities such as native configuration tables, incorrect registry or file permissions, and software configuration errors. What is the type of vulnerability assessment performed by Martin?

A. Credentialed assessment

B. Database assessment

C. Host-based assessment

D. Distributed assessment

Buy Now
Questions 7

Jake, a professional hacker, installed spyware on a target iPhone to spy on the target user's activities. He can take complete control of the target mobile device by jailbreaking the device remotely and record audio, capture screenshots, and monitor all phone calls and SMS messages. What is the type of spyware that Jake used to infect the target device?

A. DroidSheep

B. Androrat

C. Zscaler

D. Trident

Buy Now
Questions 8

_________ is a tool that can hide processes from the process list, can hide files, registry entries, and intercept keystrokes.

A. Trojan

B. RootKit

C. DoS tool

D. Scanner

E. Backdoor

Buy Now
Questions 9

In this attack, a victim receives an e-mail claiming from PayPal stating that their account has been disabled and confirmation is required before activation. The attackers then scam to collect not one but two credit card numbers, ATM PIN number and other personal details. Ignorant users usually fall prey to this scam.

Which of the following statement is incorrect related to this attack?

A. Do not reply to email messages or popup ads asking for personal or financial information

B. Do not trust telephone numbers in e-mails or popup ads

C. Review credit card and bank account statements regularly

D. Antivirus, anti-spyware, and firewall software can very easily detect these type of attacks

E. Do not send credit card numbers, and personal or financial information via e-mail

Buy Now
Questions 10

What type of a vulnerability/attack is it when the malicious person forces the user's browser to send an authenticated request to a server?

A. Session hijacking

B. Server side request forgery

C. Cross-site request forgery

D. Cross-site scripting

Buy Now
Questions 11

Robin, an attacker, is attempting to bypass the firewalls of an organization through the DNS tunneling method in order to exfiltrate data. He is using the NSTX tool for bypassing the firewalls. On which of the following ports should Robin run the NSTX tool?

A. Port 53

B. Port 23

C. Port 50

D. Port 80

Buy Now
Questions 12

Which of these is capable of searching for and locating rogue access points?

A. HIDS

B. WISS

C. WIPS

D. NIDS

Buy Now
Questions 13

This form of encryption algorithm is asymmetric key block cipher that is characterized by a 128-bit block size, and its key size can be up to 256 bits. Which among the following is this encryption algorithm?

A. Twofish encryption algorithm

B. HMAC encryption algorithm

C. IDEA D. Blowfish encryption algorithm

Buy Now
Exam Code: 312-50V11
Exam Name: Certified Ethical Hacker v11 Exam
Last Update: Nov 28, 2024
Questions: 528
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99