Download Certified Ethical Hacker v11 Exam.CertDumps.312-50v11.2021-11-15.1e.143q.vcex


Download Exam

File Info

Exam Certified Ethical Hacker v11 Exam
Number 312-50v11
File Name Certified Ethical Hacker v11 Exam.CertDumps.312-50v11.2021-11-15.1e.143q.vcex
Size 566 Kb
Posted November 15, 2021
Downloads 15



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%


 
 



Demo Questions

Question 1
Clark is a professional hacker. He created and configured multiple domains pointing to the same host to switch quickly between the domains and avoid detection. 
Identify the behavior of the adversary In the above scenario.

  • A: use of command-line interface
  • B: Data staging
  • C: Unspecified proxy activities
  • D: Use of DNS tunneling



Question 2
Elante company has recently hired James as a penetration tester. He was tasked with performing enumeration on an organization's network. In the process of enumeration, James discovered a service that is accessible to external sources. This service runs directly on port 21. What is the service enumerated byjames in the above scenario?

  • A: Border Gateway Protocol (BGP)
  • B: File Transfer Protocol (FTP)
  • C: Network File System (NFS)
  • D: Remote procedure call (RPC)



Question 3
When considering how an attacker may exploit a web server, what is web server footprinting ?

  • A: When an attacker implements a vulnerability scanner to identify weaknesses
  • B: When an attacker creates a complete profile of the site's external links and file structures
  • C: When an attacker gathers system-level data, including account details and server names
  • D: When an attacker uses a brute-force attack to crack a web-server password



Question 4
You receive an e-mail like the one shown below. When you click on the link contained in the mail, you are redirected to a website seeking you to download free Anti-Virus software. 
Dear valued customers, 
We are pleased to announce the newest version of Antivirus 2010 for Windows which will probe you with total security against the latest spyware, malware, viruses, Trojans and other online threats. Simply visit the link below and enter your antivirus code:

     

or you may contact us at the following address:
Media Internet Consultants, Edif. Neptuno, Planta 
Baja, Ave. Ricardo J. Alfaro, Tumba Muerto, n/a Panama 
How will you determine if this is Real Anti-Virus or Fake Anti-Virus website?

  • A: Look at the website design, if it looks professional then it is a Real Anti-Virus website
  • B: Connect to the site using SSL, if you are successful then the website is genuine
  • C: Search using the URL and Anti-Virus product name into Google and lookout for suspicious warnings against this site
  • D: Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware
  • E: Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware



Question 5
A large mobile telephony and data network operator has a data center that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems. 
What is the best security policy concerning this setup?

  • A: Network elements must be hardened with user ids and strong passwords. Regular security tests and audits should be performed.
  • B: As long as the physical access to the network elements is restricted, there is no need for additional measures.
  • C: There is no need for specific security measures on the network elements as long as firewalls and IPS systems exist.
  • D: The operator knows that attacks and down time are inevitable and should have a backup site.



Question 6
A company's Web development team has become aware of a certain type of security vulnerability in their Web software. To mitigate the possibility of this vulnerability being exploited, the team wants to modify the software requirements to disallow users from entering HTML as input into their Web application. 
What kind of Web application vulnerability likely exists in their software?

  • A: Cross-site scripting vulnerability
  • B: SQL injection vulnerability
  • C: Web site defacement vulnerability
  • D: Gross-site Request Forgery vulnerability



Question 7
You are a penetration tester working to test the user awareness of the employees of the client xyz. You harvested two employees' emails from some public sources and are creating a client-side backdoor to send it to the employees via email. Which stage of the cyber kill chain are you at?

  • A: Reconnaissance
  • B: Command and control
  • C: Weaponization
  • D: Exploitation



Question 8
When purchasing a biometric system, one of the considerations that should be reviewed is the processing speed. Which of the following best describes what it is meant by processing?

  • A: The amount of time and resources that are necessary to maintain a biometric system
  • B: How long it takes to setup individual user accounts
  • C: The amount of time it takes to be either accepted or rejected from when an individual provides identification and authentication information
  • D: The amount of time it takes to convert biometric data into a template on a smart card



Question 9
Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?

  • A: Yagi antenna
  • B: Dipole antenna
  • C: Parabolic grid antenna
  • D: Omnidirectional antenna



Question 10
Null sessions are un-authenticated connections (not using a username or password.) to an NT or 2000 system. 
Which TCP and UDP ports must you filter to check null sessions on your network?

  • A: 137 and 139
  • B: 137 and 443
  • C: 139 and 443
  • D: 139 and 445








ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset