EC-Council 312-50v11 Certified Ethical Hacker Exam – C|EH v11 Online Training
EC-Council 312-50v11 Online Training
The questions for 312-50v11 were last updated at Dec 26,2024.
- Exam Code: 312-50v11
- Exam Name: Certified Ethical Hacker Exam - C|EH v11
- Certification Provider: EC-Council
- Latest update: Dec 26,2024
What does the following command in netcat do?
nc -l -u -p55555 < /etc/passwd
- A . logs the incoming connections to /etc/passwd file
- B . loads the /etc/passwd file to the UDP port 55555
- C . grabs the /etc/passwd file when connected to UDP port 55555
- D . deletes the /etc/passwd file when connected to the UDP port 55555
This form of encryption algorithm is asymmetric key block cipher that is characterized by a 128-bit block size, and its key size can be up to 256 bits .
Which among the following is this encryption algorithm?
- A . Twofish encryption algorithm
- B . HMAC encryption algorithm
- C . IDEA
- D . Blowfish encryption algorithm
Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating that the port is closed.
What is the port scanning technique used by Sam to discover open ports?
- A . Xmas scan
- B . IDLE/IPID header scan
- C . TCP Maimon scan
- D . ACK flag probe scan
Mason, a professional hacker, targets an organization and spreads Emotet malware through malicious script. After infecting the victim’s device. Mason further used Emotet to spread the infection across local networks and beyond to compromise as many machines as possible. In this process, he used a tool, which is a self-extracting RAR file, to retrieve information related to network resources such as writable share drives .
What is the tool employed by Mason in the above scenario?
- A . NetPass.exe
- B . Outlook scraper
- C . WebBrowserPassView
- D . Credential enumerator
An attacker utilizes a Wi-Fi Pineapple to run an access point with a legitimate-looking SSID for a nearby business in order to capture the wireless password .
What kind of attack is this?
- A . MAC spoofing attack
- B . Evil-twin attack
- C . War driving attack
- D . Phishing attack
Mike, a security engineer, was recently hired by BigFox Ltd. The company recently experienced disastrous DoS attacks. The management had instructed Mike to build defensive strategies for the company’s IT infrastructure to thwart DoS/DDoS attacks. Mike deployed some countermeasures to handle jamming and scrambling attacks .
What is the countermeasure Mike applied to defend against jamming and scrambling attacks?
- A . Allow the usage of functions such as gets and strcpy
- B . Allow the transmission of all types of addressed packets at the ISP level
- C . Implement cognitive radios in the physical layer
- D . A Disable TCP SYN cookie protection
Which type of malware spreads from one system to another or from one network to another and causes similar types of damage as viruses do to the infected system?
- A . Rootkit
- B . Trojan
- C . A Worm
- D . Adware
Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the Information, he successfully performed an attack on the target government organization without being traced .
Which of the following techniques is described in the above scenario?
- A . Dark web footprinting
- B . VoIP footpnnting
- C . VPN footprinting
- D . website footprinting
Fred is the network administrator for his company. Fred is testing an internal switch.
From an external IP address, Fred wants to try and trick this switch into thinking it already has established a session with his computer .
How can Fred accomplish this?
- A . Fred can accomplish this by sending an IP packet with the RST/SIN bit and the source address of his computer.
- B . He can send an IP packet with the SYN bit and the source address of his computer.
- C . Fred can send an IP packet with the ACK bit set to zero and the source address of the switch.
- D . Fred can send an IP packet to the switch with the ACK bit and the source address of his machine.
in this attack, an adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying cryptographic handshake messages. When the victim reinstall the key, associated parameters such as the incremental transmit packet number and receive packet number are reset to their initial values .
What is this attack called?
- A . Chop chop attack
- B . KRACK
- C . Evil twin
- D . Wardriving