Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

312-50v11 Certified Ethical Hacker Exam (CEH v11) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

312-50v11 Practice Questions

Certified Ethical Hacker Exam (CEH v11)

Last Update 2 days ago
Total Questions : 528

Dive into our fully updated and stable 312-50v11 practice test platform, featuring all the latest CEH v11 exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free CEH v11 practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 312-50v11. Use this test to pinpoint which areas you need to focus your study on.

312-50v11 PDF

312-50v11 PDF (Printable)
$43.75
$124.99

312-50v11 Testing Engine

312-50v11 PDF (Printable)
$50.75
$144.99

312-50v11 PDF + Testing Engine

312-50v11 PDF (Printable)
$63.7
$181.99
Question # 31

Windows LAN Manager (LM) hashes are known to be weak.

Which of the following are known weaknesses of LM? (Choose three.)

Options:

A.  

Converts passwords to uppercase.

B.  

Hashes are sent in clear text over the network.

C.  

Makes use of only 32-bit encryption.

D.  

Effective length is 7 characters.

Discussion 0
Question # 32

Which file is a rich target to discover the structure of a website during web-server footprinting?

Options:

A.  

Document root

B.  

Robots.txt

C.  

domain.txt

D.  

index.html

Discussion 0
Question # 33

Sam, a professional hacker. targeted an organization with intention of compromising AWS IAM credentials. He attempted to lure one of the employees of the organization by initiating fake calls while posing as a legitimate employee. Moreover, he sent phishing emails to steal the AWS 1AM credentials and further compromise the employee's account. What is the technique used by Sam to compromise the AWS IAM credentials?

Options:

A.  

Social engineering

B.  

insider threat

C.  

Password reuse

D.  

Reverse engineering

Discussion 0
Question # 34

Lewis, a professional hacker, targeted the loT cameras and devices used by a target venture-capital firm. He used an information-gathering tool to collect information about the loT devices connected to a network, open ports and services, and the attack surface area. Using this tool, he also generated statistical reports on broad usage patterns and trends. This tool helped Lewis continually monitor every reachable server and device on the Internet, further allowing him to exploit these devices in the network. Which of the following tools was employed by Lewis in the above scenario?

Options:

A.  

Censys

B.  

Wapiti

C.  

NeuVector

D.  

Lacework

Discussion 0
Question # 35

An attacker attaches a rogue router in a network. He wants to redirect traffic to a LAN attached to his router as part of a man-in-the-middle attack. What measure on behalf of the legitimate admin can mitigate this attack?

Options:

A.  

Make sure that legitimate network routers are configured to run routing protocols with authentication.

B.  

Disable all routing protocols and only use static routes

C.  

Only using OSPFv3 will mitigate this risk.

D.  

Redirection of the traffic cannot happen unless the admin allows it explicitly.

Discussion 0
Question # 36

While using your bank’s online servicing you notice the following string in the URL bar:

“http: // www. MyPersonalBank. com/ account?id=368940911028389 &Damount=10980&Camount=21”

You observe that if you modify the Damount & Camount values and submit the request, that data on the web page reflects the changes.

Which type of vulnerability is present on this site?

Options:

A.  

Cookie Tampering

B.  

SQL Injection

C.  

Web Parameter Tampering

D.  

XSS Reflection

Discussion 0
Question # 37

Wilson, a professional hacker, targets an organization for financial benefit and plans to compromise its systems by sending malicious emails. For this purpose, he uses a tool to track the emails of the target and extracts information such as sender identities, mall servers, sender IP addresses, and sender locations from different public sources. He also checks if an email address was leaked using the haveibeenpwned.com API. Which of the following tools is used by Wilson in the above scenario?

Options:

A.  

Factiva

B.  

Netcraft

C.  

infoga

D.  

Zoominfo

Discussion 0
Question # 38

This type of injection attack does not show any error message. It is difficult to exploit as it returns information when the application is given SQL payloads that elicit a true or false response from the server. By observing the response, an attacker can extract sensitive information. What type of attack is this?

Options:

A.  

Time-based SQL injection

B.  

Union SQL injection

C.  

Error-based SQL injection

D.  

Blind SQL injection

Discussion 0
Question # 39

This is an attack that takes advantage of a web site vulnerability in which the site displays content that includes un-sanitized user-provided data.

Question # 39

What is this attack?

Options:

A.  

Cross-site-scripting attack

B.  

SQL Injection

C.  

URL Traversal attack

D.  

Buffer Overflow attack

Discussion 0
Question # 40

Garry is a network administrator in an organization. He uses SNMP to manage networked devices from a remote location. To manage nodes in the network, he uses MI

B.  

which contains formal descriptions of all network objects managed by SNMP. He accesses the contents of MIB by using a web browser either by entering the IP address and Lseries.mlb or by entering the DNS library name and Lseries.mlb. He is currently retrieving information from an MIB that contains object types for workstations and server services. Which of the following types of MIB is accessed by Garry in the above scenario?

Options:

A.  

LNMIB2.MIB

B.  

WINS.MIB

C.  

DHCP.MIS

D.  

MIB_II.MIB

Discussion 0
Get 312-50v11 dumps and pass your exam in 24 hours!

Free Exams Sample Questions