Free 312-50v11 Exam Braindumps

Pass your Certified Ethical Hacker Exam (CEH v11) exam with these free Questions and Answers

Page 25 of 106
QUESTION 116

in the Common Vulnerability Scoring System (CVSS) v3.1 severity ratings, what range does medium vulnerability fall in?

  1. A. 3.0-6.9
  2. B. 40-6.0
  3. C. 4.0-6.9
  4. D. 3.9-6.9

Correct Answer: C
312-50v11 dumps exhibit

QUESTION 117

jane, an ethical hacker. Is testing a target organization's web server and website to identity security loopholes. In this process, she copied the entire website and its content on a local drive to view the complete profile of the site's directory structure, file structure, external links, images, web pages, and so on. This information helps jane map the website's directories and gain valuable information. What is the attack technique employed by Jane in the above scenario?

  1. A. website mirroring
  2. B. Session hijacking
  3. C. Web cache poisoning
  4. D. Website defacement

Correct Answer: A
A mirror site may be a website or set of files on a computer server that has been copied to a different computer server in order that the location or files are available from quite one place. A mirror site has its own URL, but is otherwise just like the principal site. Load-balancing devices allow high-volume sites to scale easily, dividing the work between multiple mirror sites.A mirror site is typically updated frequently to make sure it reflects the contents of the first site. In some cases, the first site may arrange for a mirror site at a bigger location with a better speed connection and, perhaps, a better proximity to an outsized audience.If the first site generates an excessive amount of traffic, a mirror site can ensure better availability of the web site or files. For websites that provide copies or updates of widely used software, a mirror site allows the location to handle larger demands and enables the downloaded files to arrive more quickly. Microsoft, Sun Microsystems and other companies have mirror sites from which their browser software are often downloaded.Mirror sites are wont to make site access faster when the first site could also be geographically distant from those accessing it. A mirrored web server is usually located on a special continent from the principal site, allowing users on the brink of the mirror site to urge faster and more reliable access.Mirroring an internet site also can be done to make sure that information are often made available to places where access could also be unreliable or censored. In 2013, when Chinese authorities blocked access to foreign media outlets just like the Wall Street Journal and Reuters, site mirroring was wont to restore access and circumvent government censorship.

QUESTION 118

The network administrator at Spears Technology, Inc has configured the default gateway Cisco router's access-list as below:
You are hired to conduct security testing on their network.
You successfully brute-force the SNMP community string using a SNMP crack tool.
The access-list configured at the router prevents you from establishing a successful connection. You want to retrieve the Cisco configuration from the router. How would you proceed?

  1. A. Use the Cisco's TFTP default password to connect and download the configuration file
  2. B. Run a network sniffer and capture the returned traffic with the configuration file from the router
  3. C. Run Generic Routing Encapsulation (GRE) tunneling protocol from your computer to the router masking your IP address
  4. D. Send a customized SNMP set request with a spoofed source IP address in the range -192.168.1.0

Correct Answer: BD

QUESTION 119

What information security law or standard aims at protecting stakeholders and the general public from accounting errors and fraudulent activities within organizations?

  1. A. PCI-DSS
  2. B. FISMA
  3. C. SOX
  4. D. ISO/I EC 27001:2013

Correct Answer: C

QUESTION 120

A large mobile telephony and data network operator has a data center that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems.
What is the best security policy concerning this setup?

  1. A. Network elements must be hardened with user ids and strong password
  2. B. Regular security tests and audits should be performed.
  3. C. As long as the physical access to the network elements is restricted, there is no need for additional measures.
  4. D. There is no need for specific security measures on the network elements as long as firewalls and IPS systems exist.
  5. E. The operator knows that attacks and down time are inevitable and should have a backup site.

Correct Answer: A

Page 25 of 106

Post your Comments and Discuss EC-Council 312-50v11 exam with other Community members: