Free 312-50v11 Exam Braindumps

Pass your Certified Ethical Hacker Exam (CEH v11) exam with these free Questions and Answers

Page 21 of 106
QUESTION 96

Juliet, a security researcher in an organization, was tasked with checking for the authenticity of images to be used in the organization's magazines. She used these images as a search query and tracked the original source and details of the images, which included photographs, profile pictures, and memes. Which of the following footprinting techniques did Rachel use to finish her task?

  1. A. Reverse image search
  2. B. Meta search engines
  3. C. Advanced image search
  4. D. Google advanced search

Correct Answer: C

QUESTION 97

Based on the below log, which of the following sentences are true?
Mar 1, 2016, 7:33:28 AM 10.240.250.23 - 54373 10.249.253.15 - 22 tcp_ip

  1. A. Application is FTP and 10.240.250.23 is the client and 10.249.253.15 is the server.
  2. B. Application is SSH and 10.240.250.23 is the server and 10.249.253.15 is the client.
  3. C. SSH communications are encrypted; it’s impossible to know who is the client or the server.
  4. D. Application is SSH and 10.240.250.23 is the client and 10.249.253.15 is the server.

Correct Answer: D

QUESTION 98

“........is an attack type for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications. It is the wireless version of the phishing scam. An attacker fools wireless users into connecting a laptop or mobile phone to a tainted hot-spot by posing as a legitimate provider. This type of attack may be used to steal the passwords of
unsuspecting users by either snooping the communication link or by phishing, which involves setting up a fraudulent web site and luring people there.”
Fill in the blank with appropriate choice.

  1. A. Evil Twin Attack
  2. B. Sinkhole Attack
  3. C. Collision Attack
  4. D. Signal Jamming Attack

Correct Answer: A

QUESTION 99

Which type of sniffing technique is generally referred as MiTM attack?
312-50v11 dumps exhibit

  1. A. Password Sniffing
  2. B. ARP Poisoning
  3. C. Mac Flooding
  4. D. DHCP Sniffing

Correct Answer: B

QUESTION 100

In the context of password security, a simple dictionary attack involves loading a dictionary file (a text file full of dictionary words) into a cracking application such as L0phtCrack or John the Ripper, and running it against user accounts located by the application. The larger the word and word fragment selection, the more effective the dictionary attack is. The brute force method is the most inclusive, although slow. It usually tries every possible letter and number combination in its automated exploration. If you would use both brute force and dictionary methods combined together to have variation of words, what would you call such an attack?

  1. A. Full Blown
  2. B. Thorough
  3. C. Hybrid
  4. D. BruteDics

Correct Answer: C

Page 21 of 106

Post your Comments and Discuss EC-Council 312-50v11 exam with other Community members: