Free 312-50v11 Exam Braindumps

Pass your Certified Ethical Hacker Exam (CEH v11) exam with these free Questions and Answers

Page 20 of 106
QUESTION 91

Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the Information, he successfully performed an attack on the target government organization without being traced. Which of the following techniques is described in the above scenario?

  1. A. Dark web footprinting
  2. B. VoIP footpnnting
  3. C. VPN footprinting
  4. D. website footprinting

Correct Answer: A
The deep web is the layer of the online cyberspace that consists of web pages and content that are hidden and unindexed.

QUESTION 92

Which method of password cracking takes the most time and effort?

  1. A. Dictionary attack
  2. B. Shoulder surfing
  3. C. Rainbow tables
  4. D. Brute force

Correct Answer: D

QUESTION 93

Scenario1:
* 1. Victim opens the attacker's web site.
* 2. Attacker sets up a web site which contains interesting and attractive content like 'Do you want to make
$1000 in a day?'.
* 3. Victim clicks to the interesting and attractive content URL.
* 4. Attacker creates a transparent 'iframe' in front of the URL which victim attempts to click, so victim thinks that he/she clicks to the 'Do you want to make $1000 in a day?' URL but actually he/she clicks to the content or URL that exists in the transparent 'iframe' which is setup by the attacker.
What is the name of the attack which is mentioned in the scenario?

  1. A. Session Fixation
  2. B. HTML Injection
  3. C. HTTP Parameter Pollution
  4. D. Clickjacking Attack

Correct Answer: D

QUESTION 94

While browsing his Facebook teed, Matt sees a picture one of his friends posted with the caption. "Learn more about your friends!", as well as a number of personal questions. Matt is suspicious and texts his friend, who confirms that he did indeed post it. With assurance that the post is legitimate. Matt responds to the questions on the post, a few days later. Mates bank account has been accessed, and the password has been changed. What most likely happened?

  1. A. Matt inadvertently provided the answers to his security questions when responding to the post.
  2. B. Matt's bank-account login information was brute forced.
  3. C. Matt Inadvertently provided his password when responding to the post.
  4. D. Matt's computer was infected with a keylogger.

Correct Answer: A

QUESTION 95

Why should the security analyst disable/remove unnecessary ISAPI filters?

  1. A. To defend against social engineering attacks
  2. B. To defend against webserver attacks
  3. C. To defend against jailbreaking
  4. D. To defend against wireless attacks

Correct Answer: B

Page 20 of 106

Post your Comments and Discuss EC-Council 312-50v11 exam with other Community members: