Download Certified Ethical Hacker v11 Exam.CertDumps.312-50v11.2022-04-14.1e.441q.vcex

Download Exam

File Info

Exam Certified Ethical Hacker v11 Exam
Number 312-50v11
File Name Certified Ethical Hacker v11 Exam.CertDumps.312-50v11.2022-04-14.1e.441q.vcex
Size 2.57 Mb
Posted April 14, 2022
Downloads 33

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Coupon: EXAM_HUB

Discount: 20%


Demo Questions

Question 1
Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?

  • A: 113
  • B: 69
  • C: 123
  • D: 161

Question 2
An organization is performing a vulnerability assessment tor mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization's machines to detect which ports are attached to services such as an email server, a web server or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests. What is the type of vulnerability assessment solution that James employed in the above scenario?

  • A: Product-based solutions
  • B: Tree-based assessment
  • C: Service-based solutions
  • D: inference-based assessment

Question 3
An attacker identified that a user and an access point are both compatible with WPA2 and WPA3 encryption. The attacker installed a rogue access point with only WPA2 compatibility in the vicinity and forced the victim to go through the WPA2 four-way handshake to get connected. After the connection was established, the attacker used automated tools to crack WPA2-encrypted messages. What is the attack performed in the above scenario?

  • A: Timing-based attack
  • B: Side-channel attack
  • C: Downgrade security attack
  • D: Cache-based attack

Question 4
Which of the following DoS tools is used to attack target web applications by starvation of available sessions on the web server? 
The tool keeps sessions at halt using never-ending POST transmissions and sending an arbitrarily large content-length header value.

  • A: My Doom
  • B: Astacheldraht
  • C: R-U-Dead-Yet?(RUDY)
  • D: LOIC

Question 5
Which of the following incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an organization?

  • A: Preparation phase 
  • B: Containment phase
  • C: Identification phase
  • D: Recovery phase

Question 6
Clark is a professional hacker. He created and configured multiple domains pointing to the same host to switch quickly between the domains and avoid detection. 
Identify the behavior of the adversary In the above scenario.

  • A: use of command-line interface
  • B: Data staging
  • C: Unspecified proxy activities
  • D: Use of DNS tunneling

Question 7
By performing a penetration test, you gained access under a user account. During the test, you established a connection with your own machine via the SMB service and occasionally entered your login and password in plaintext. Which file do you have to clean to clear the password?

  • A: .X session-log
  • B: .bashrc
  • C: .profile
  • D: .bash_history

Question 8
Chandler works as a pen-tester in an IT-firm in New York. As a part of detecting viruses in the systems, he uses a detection method where the anti-virus executes the malicious codes on a virtual machine to simulate CPU and memory activities. Which type of virus detection method did Chandler use in this context?

  • A: Heuristic Analysis
  • B: Code Emulation
  • C: Scanning
  • D: Integrity checking

Question 9
Internet Protocol Security IPsec is actually a suite pf protocols. Each protocol within the suite provides different functionality. Collective IPsec does everything except.

  • A: Protect the payload and the headers
  • B: Encrypt
  • C: Work at the Data Link Layer
  • D: Authenticate

Question 10
Based on the below log, which of the following sentences are true? 
Mar 1, 2016, 7:33:28 AM - 54373 - 22 tcp_ip

  • A: Application is FTP and is the client and is the server.
  • B: Application is SSH and is the server and is the client.
  • C: SSH communications are encrypted; it's impossible to know who is the client or the server. 
  • D: Application is SSH and is the client and is the server.



You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files