Download Certified Ethical Hacker v11 Exam.CertDumps.312-50v11.2022-04-25.1e.461q.vcex


Download Exam

File Info

Exam Certified Ethical Hacker v11 Exam
Number 312-50v11
File Name Certified Ethical Hacker v11 Exam.CertDumps.312-50v11.2022-04-25.1e.461q.vcex
Size 2.79 Mb
Posted April 25, 2022
Downloads 18



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%


 
 



Demo Questions

Question 1
Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?

  • A: 113
  • B: 69
  • C: 123
  • D: 161



Question 2
An organization is performing a vulnerability assessment tor mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization's machines to detect which ports are attached to services such as an email server, a web server or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests. What is the type of vulnerability assessment solution that James employed in the above scenario?

  • A: Product-based solutions
  • B: Tree-based assessment
  • C: Service-based solutions
  • D: inference-based assessment



Question 3
An attacker identified that a user and an access point are both compatible with WPA2 and WPA3 encryption. The attacker installed a rogue access point with only WPA2 compatibility in the vicinity and forced the victim to go through the WPA2 four-way handshake to get connected. After the connection was established, the attacker used automated tools to crack WPA2-encrypted messages. What is the attack performed in the above scenario?

  • A: Timing-based attack
  • B: Side-channel attack
  • C: Downgrade security attack
  • D: Cache-based attack



Question 4
Which of the following DoS tools is used to attack target web applications by starvation of available sessions on the web server? 
The tool keeps sessions at halt using never-ending POST transmissions and sending an arbitrarily large content-length header value.

  • A: My Doom
  • B: Astacheldraht
  • C: R-U-Dead-Yet?(RUDY)
  • D: LOIC



Question 5
Which of the following incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an organization?

  • A: Preparation phase 
  • B: Containment phase
  • C: Identification phase
  • D: Recovery phase



Question 6
Clark is a professional hacker. He created and configured multiple domains pointing to the same host to switch quickly between the domains and avoid detection. 
Identify the behavior of the adversary In the above scenario.

  • A: use of command-line interface
  • B: Data staging
  • C: Unspecified proxy activities
  • D: Use of DNS tunneling



Question 7
By performing a penetration test, you gained access under a user account. During the test, you established a connection with your own machine via the SMB service and occasionally entered your login and password in plaintext. Which file do you have to clean to clear the password?

  • A: .X session-log
  • B: .bashrc
  • C: .profile
  • D: .bash_history



Question 8
Chandler works as a pen-tester in an IT-firm in New York. As a part of detecting viruses in the systems, he uses a detection method where the anti-virus executes the malicious codes on a virtual machine to simulate CPU and memory activities. Which type of virus detection method did Chandler use in this context?

  • A: Heuristic Analysis
  • B: Code Emulation
  • C: Scanning
  • D: Integrity checking



Question 9
Internet Protocol Security IPsec is actually a suite pf protocols. Each protocol within the suite provides different functionality. Collective IPsec does everything except.

  • A: Protect the payload and the headers
  • B: Encrypt
  • C: Work at the Data Link Layer
  • D: Authenticate



Question 10
Based on the below log, which of the following sentences are true? 
Mar 1, 2016, 7:33:28 AM 10.240.250.23 - 54373 10.249.253.15 - 22 tcp_ip

  • A: Application is FTP and 10.240.250.23 is the client and 10.249.253.15 is the server.
  • B: Application is SSH and 10.240.250.23 is the server and 10.249.253.15 is the client.
  • C: SSH communications are encrypted; it's impossible to know who is the client or the server. 
  • D: Application is SSH and 10.240.250.23 is the client and 10.249.253.15 is the server.








ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset