Free 312-50v11 Exam Braindumps

Pass your Certified Ethical Hacker Exam (CEH v11) exam with these free Questions and Answers

Page 26 of 106
QUESTION 121

What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?

  1. A. Residual risk
  2. B. Impact risk
  3. C. Deferred risk
  4. D. Inherent risk

Correct Answer: A

QUESTION 122

What is the first step for a hacker conducting a DNS cache poisoning (DNS spoofing) attack against an organization?

  1. A. The attacker queries a nameserver using the DNS resolver.
  2. B. The attacker makes a request to the DNS resolver.
  3. C. The attacker forges a reply from the DNS resolver.
  4. D. The attacker uses TCP to poison the ONS resofver.

Correct Answer: A

QUESTION 123

What is a NULL scan?

  1. A. A scan in which all flags are turned off
  2. B. A scan in which certain flags are off
  3. C. A scan in which all flags are on
  4. D. A scan in which the packet size is set to zero
  5. E. A scan with an illegal packet size

Correct Answer: A

QUESTION 124

Alice, a professional hacker, targeted an organization's cloud services. She infiltrated the targets MSP provider by sending spear-phishing emails and distributed custom-made malware to compromise user accounts and gain remote access to the cloud service. Further, she accessed the target customer profiles with her MSP account, compressed the customer data, and stored them in the MSP. Then, she used this information to launch further attacks on the target organization. Which of the following cloud attacks did Alice perform in the above scenario?

  1. A. Cloud hopper attack
  2. B. Cloud cryptojacking
  3. C. Cloudborne attack
  4. D. Man-in-the-cloud (MITC) attack

Correct Answer: A
Operation Cloud Hopper was an in depth attack and theft of data in 2017 directed at MSP within the uk (U.K.), us (U.S.), Japan, Canada, Brazil, France, Switzerland, Norway, Finland, Sweden, South Africa , India, Thailand, South Korea and Australia. The group used MSP as intermediaries to accumulate assets and trade secrets from MSP client engineering, MSP industrial manufacturing, retail, energy, pharmaceuticals, telecommunications, and government agencies.Operation Cloud Hopper used over 70 variants of backdoors, malware and trojans. These were delivered through spear-phishing emails. The attacks scheduled tasks or leveraged services/utilities to continue Microsoft Windows systems albeit the pc system was rebooted. It installed malware and hacking tools to access systems and steal data.

QUESTION 125

The tools which receive event logs from servers, network equipment, and applications, and perform analysis and correlation on those logs, and can generate alarms for security relevant issues, are known as what?

  1. A. network Sniffer
  2. B. Vulnerability Scanner
  3. C. Intrusion prevention Server
  4. D. Security incident and event Monitoring

Correct Answer: D

Page 26 of 106

Post your Comments and Discuss EC-Council 312-50v11 exam with other Community members: