EC-Council 312-50v11 Certified Ethical Hacker Exam – C|EH v11 Online Training
EC-Council 312-50v11 Online Training
The questions for 312-50v11 were last updated at Dec 25,2024.
- Exam Code: 312-50v11
- Exam Name: Certified Ethical Hacker Exam - C|EH v11
- Certification Provider: EC-Council
- Latest update: Dec 25,2024
Joel, a professional hacker, targeted a company and identified the types of websites frequently visited by its employees. Using this information, he searched for possible loopholes in these websites and injected a malicious script that can redirect users from the web page and download malware onto a victim’s machine. Joel waits for the victim to access the infected web application so as to compromise the victim’s machine .
Which of the following techniques is used by Joel in the above scenario?
- A . DNS rebinding attack
- B . Clickjacking attack
- C . MarioNet attack
- D . Watering hole attack
John is investigating web-application firewall logs and observers that someone is attempting to inject the following:
char buff[10];
buff[>o] – ‘a’:
What type of attack is this?
- A . CSRF
- B . XSS
- C . Buffer overflow
- D . SQL injection
In an internal security audit, the white hat hacker gains control over a user account and attempts to acquire access to another account’s confidential files and information .
How can he achieve this?
- A . Privilege Escalation
- B . Shoulder-Surfing
- C . Hacking Active Directory
- D . Port Scanning
Which is the first step followed by Vulnerability Scanners for scanning a network?
- A . OS Detection
- B . Firewall detection
- C . TCP/UDP Port scanning
- D . Checking if the remote host is alive
Which of these is capable of searching for and locating rogue access points?
- A . HIDS
- B . WISS
- C . WIPS
- D . NIDS
John, a security analyst working for an organization, found a critical vulnerability on the
organization’s LAN that allows him to view financial and personal information about the rest of the employees. Before reporting the vulnerability, he examines the information shown by the vulnerability for two days without disclosing any information to third parties or other internal employees. He does so out of curiosity about the other employees and may take advantage of this information later .
What would John be considered as?
- A . Acybercriminal
- B . Black hat
- C . White hat
- D . Gray hat
During an Xmas scan what indicates a port is closed?
- A . No return response
- B . RST
- C . ACK
- D . SYN
You work for Acme Corporation as Sales Manager. The company has tight network security restrictions. You are trying to steal data from the company’s Sales database (Sales.xls) and transfer them to your home computer. Your company filters and monitors traffic that leaves from the internal network to the Internet .
How will you achieve this without raising suspicion?
- A . Encrypt the Sales.xls using PGP and e-mail it to your personal gmail account
- B . Package the Sales.xls using Trojan wrappers and telnet them back your home computer
- C . You can conceal the Sales.xls database in another file like photo.jpg or other files and send it out in an innocent looking email or file transfer using Steganography techniques
- D . Change the extension of Sales.xls to sales.txt and upload them as attachment to your hotmail account
Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers.
The time a hacker spends performing research to locate this information about a company is known as?
- A . Exploration
- B . Investigation
- C . Reconnaissance
- D . Enumeration
Which of the following tactics uses malicious code to redirect users’ web traffic?
- A . Spimming
- B . Pharming
- C . Phishing
- D . Spear-phishing