Download Certified Ethical Hacker v11 Exam.CertDumps.312-50v11.2022-05-21.1e.508q.vcex

Download Exam

File Info

Exam Certified Ethical Hacker v11 Exam
Number 312-50v11
File Name Certified Ethical Hacker v11 Exam.CertDumps.312-50v11.2022-05-21.1e.508q.vcex
Size 2.91 Mb
Posted May 21, 2022
Downloads 58

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

 
 



Demo Questions

Question 1
Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?

  • A: 113
  • B: 69
  • C: 123
  • D: 161



Question 2
An organization is performing a vulnerability assessment tor mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization's machines to detect which ports are attached to services such as an email server, a web server or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests. What is the type of vulnerability assessment solution that James employed in the above scenario?

  • A: Product-based solutions
  • B: Tree-based assessment
  • C: Service-based solutions
  • D: inference-based assessment



Question 3
An attacker identified that a user and an access point are both compatible with WPA2 and WPA3 encryption. The attacker installed a rogue access point with only WPA2 compatibility in the vicinity and forced the victim to go through the WPA2 four-way handshake to get connected. After the connection was established, the attacker used automated tools to crack WPA2-encrypted messages. What is the attack performed in the above scenario?

  • A: Timing-based attack
  • B: Side-channel attack
  • C: Downgrade security attack
  • D: Cache-based attack



Question 4
Which of the following DoS tools is used to attack target web applications by starvation of available sessions on the web server? 
The tool keeps sessions at halt using never-ending POST transmissions and sending an arbitrarily large content-length header value.

  • A: My Doom
  • B: Astacheldraht
  • C: R-U-Dead-Yet?(RUDY)
  • D: LOIC



Question 5
Jack, a professional hacker, targets an organization and performs vulnerability scanning on the target web server to identify any possible weaknesses, vulnerabilities, and misconfigurations. In this process, Jack uses an automated tool that eases his work and performs vulnerability scanning to find hosts, services, and other vulnerabilities in the target server. Which of the following tools is used by Jack to perform vulnerability scanning?

  • A: Infoga
  • B: WebCopier Pro
  • C: Netsparker
  • D: NCollector Studio



Question 6
Which of the following incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an organization?

  • A: Preparation phase 
  • B: Containment phase
  • C: Identification phase
  • D: Recovery phase



Question 7
Clark is a professional hacker. He created and configured multiple domains pointing to the same host to switch quickly between the domains and avoid detection. 
Identify the behavior of the adversary In the above scenario.

  • A: use of command-line interface
  • B: Data staging
  • C: Unspecified proxy activities
  • D: Use of DNS tunneling



Question 8
By performing a penetration test, you gained access under a user account. During the test, you established a connection with your own machine via the SMB service and occasionally entered your login and password in plaintext. Which file do you have to clean to clear the password?

  • A: .X session-log
  • B: .bashrc
  • C: .profile
  • D: .bash_history



Question 9
John, a security analyst working for an organization, found a critical vulnerability on the organization's LAN that allows him to view financial and personal information about the rest of the employees. Before reporting the vulnerability, he examines the information shown by the vulnerability for two days without disclosing any information to third parties or other internal employees. He does so out of curiosity about the other employees and may take advantage of this information later. What would John be considered as?

  • A: Cybercriminal
  • B: Black hat
  • C: White hat
  • D: Gray hat



Question 10
Chandler works as a pen-tester in an IT-firm in New York. As a part of detecting viruses in the systems, he uses a detection method where the anti-virus executes the malicious codes on a virtual machine to simulate CPU and memory activities. Which type of virus detection method did Chandler use in this context?

  • A: Heuristic Analysis
  • B: Code Emulation
  • C: Scanning
  • D: Integrity checking






CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset