Free 312-50v11 Exam Braindumps

Pass your Certified Ethical Hacker Exam (CEH v11) exam with these free Questions and Answers

Page 2 of 106
QUESTION 1

You are attempting to crack LM Manager hashed from Windows 2000 SAM file. You will be using LM Brute force hacking tool for decryption. What encryption algorithm will you be decrypting?

  1. A. MD4
  2. B. DES
  3. C. SHA
  4. D. SSL

Correct Answer: B

QUESTION 2

You start performing a penetration test against a specific website and have decided to start from grabbing all the links from the main page.
What Is the best Linux pipe to achieve your milestone?

  1. A. dirb https://site.com | grep "site"
  2. B. curl -s https://sile.com | grep ‘’< a>wget https://stte.com | grep "< a href=\*http>wgethttps://site.com | cut-d"http

Correct Answer: C

QUESTION 3

What is the minimum number of network connections in a multihomed firewall?

  1. A. 3
  2. B. 5
  3. C. 4
  4. D. 2

Correct Answer: A

QUESTION 4

You receive an e-mail like the one shown below. When you click on the link contained in the mail, you are redirected to a website seeking you to download free Anti-Virus software.
Dear valued customers,
We are pleased to announce the newest version of Antivirus 2010 for Windows which will probe you with total security against the latest spyware, malware, viruses, Trojans and other online threats. Simply visit the link below and enter your antivirus code:
312-50v11 dumps exhibit
or you may contact us at the following address: Media Internet Consultants, Edif. Neptuno, Planta
Baja, Ave. Ricardo J. Alfaro, Tumba Muerto, n/a Panama
How will you determine if this is Real Anti-Virus or Fake Anti-Virus website?

  1. A. Look at the website design, if it looks professional then it is a Real Anti-Virus website
  2. B. Connect to the site using SSL, if you are successful then the website is genuine
  3. C. Search using the URL and Anti-Virus product name into Google and lookout for suspicious warnings against this site
  4. D. Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware
  5. E. Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware

Correct Answer: C

QUESTION 5

Eric, a cloud security engineer, implements a technique for securing the cloud resources used by his organization. This technique assumes by default that a user attempting to access the network is not an authentic entity and verifies every incoming connection before allowing access to the network. Using this technique, he also imposed conditions such that employees can access only the resources required for their role.
What is the technique employed by Eric to secure cloud resources?

  1. A. Serverless computing
  2. B. Demilitarized zone
  3. C. Container technology
  4. D. Zero trust network

Correct Answer: D

Page 2 of 106

Post your Comments and Discuss EC-Council 312-50v11 exam with other Community members: