Download Certified Ethical Hacker v11 Exam.312-50v11.ExamTopics.2025-06-05.400q.vcex

Vendor: ECCouncil
Exam Code: 312-50v11
Exam Name: Certified Ethical Hacker v11 Exam
Date: Jun 05, 2025
File Size: 904 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

ProfExam Discount

Demo Questions

Question 1
While performing online banking using a Web browser, a user receives an email that contains a link to an interesting Web site. When the user clicks on the link, another Web browser session starts and displays a video of cats playing a piano. The next business day, the user receives what looks like an email from his bank, indicating that his bank account has been accessed from a foreign country. The email asks the user to call his bank and verify the authorization of a funds transfer that took place. What Web browser-based security vulnerability was exploited to compromise the user?
  1. Clickjacking
  2. Cross-Site Scripting
  3. Cross-Site Request Forgery
  4. Web form input validation
Correct answer: C
Question 2
Which is the first step followed by Vulnerability Scanners for scanning a network?
  1. OS Detection
  2. Firewall detection
  3. TCP/UDP Port scanning
  4. Checking if the remote host is alive
Correct answer: D
Question 3
Your company performs penetration tests and security assessments for small and medium-sized business in the local area. During a routine security assessment, you discover information that suggests your client is involved with human trafficking.
What should you do?
  1. Confront the client in a respectful manner and ask her about the data.
  2. Copy the data to removable media and keep it in case you need it.
  3. Ignore the data and continue the assessment until completed as agreed.
  4. Immediately stop work and contact the proper legal authorities.
Correct answer: D
Question 4
While using your bank's online servicing you notice the following string in the URL bar:
`http://www.MyPersonalBank.com/account?id=368940911028389=10980=21`
You observe that if you modify the Damount & Camount values and submit the request, that data on the web page reflect the changes.
Which type of vulnerability is present on this site?
  1. Cookie Tampering
  2. SQL Injection
  3. Web Parameter Tampering
  4. XSS Reflection
Correct answer: C
Question 5
The establishment of a TCP connection involves a negotiation called three-way handshake. What type of message does the client send to the server in order to begin this negotiation?
  1. ACK
  2. SYN
  3. RST
  4. SYN-ACK
Correct answer: B
Question 6
Which type of security feature stops vehicles from crashing through the doors of a building?
  1. Bollards
  2. Receptionist
  3. Mantrap
  4. Turnstile
Correct answer: A
Question 7
The company ABC recently contracts a new accountant. The accountant will be working with the financial statements. Those financial statements need to be approved by the CFO and then they will be sent to the accountant but the CFO is worried because he wants to be sure that the information sent to the accountant was not modified once he approved it. Which of the following options can be useful to ensure the integrity of the data?
  1. The CFO can use a hash algorithm in the document once he approved the financial statements
  2. The CFO can use an excel file with a password
  3. The financial statements can be sent twice, one by email and the other delivered in USB and the accountant can compare both to be sure is the same document
  4. The document can be sent to the accountant using an exclusive USB for that document
Correct answer: A
Question 8
What is the purpose of a demilitarized zone on a network?
  1. To scan all traffic coming through the DMZ to the internal network
  2. To only provide direct access to the nodes within the DMZ and protect the network behind it
  3. To provide a place to put the honeypot
  4. To contain the network devices you wish to protect
Correct answer: B
Question 9
Which of the following Linux commands will resolve a domain name into IP address?
  1. >host-t a hackeddomain.com
  2. >host-t ns hackeddomain.com
  3. >host -t soa hackeddomain.com
  4. >host -t AXFR hackeddomain.com
Correct answer: A
Question 10
Shellshock allowed an unauthorized user to gain access to a server. It affected many Internet-facing services, which OS did it not directly affect?
  1. Linux
  2. Unix
  3. OS X
  4. Windows
Correct answer: D
Question 11
Which regulation defines security and privacy controls for Federal information systems and organizations?
  1. HIPAA
  2. EU Safe Harbor
  3. PCI-DSS
  4. NIST-800-53
Correct answer: D
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!