Free 312-50v11 Exam Braindumps

Pass your Certified Ethical Hacker Exam (CEH v11) exam with these free Questions and Answers

Page 28 of 106
QUESTION 131

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible. But they are not accessible when you try using the URL.
What may be the problem?

  1. A. Traffic is Blocked on UDP Port 53
  2. B. Traffic is Blocked on TCP Port 80
  3. C. Traffic is Blocked on TCP Port 54
  4. D. Traffic is Blocked on UDP Port 80

Correct Answer: A

QUESTION 132

Security administrator John Smith has noticed abnormal amounts of traffic coming from local computers at night. Upon reviewing, he finds that user data have been exfilltrated by an attacker. AV tools are unable to find any malicious software, and the IDS/IPS has not reported on any non-whitelisted programs, what type of malware did the attacker use to bypass the company's application whitelisting?

  1. A. Phishing malware
  2. B. Zero-day malware
  3. C. File-less malware
  4. D. Logic bomb malware

Correct Answer: C
https://www.mcafee.com/enterprise/en-us/security-awareness/ransomware/what-is-fileless-malware.html

QUESTION 133

Which of the following program infects the system boot sector and the executable files at the same time?

  1. A. Polymorphic virus
  2. B. Stealth virus
  3. C. Multipartite Virus
  4. D. Macro virus

Correct Answer: C

QUESTION 134

Taylor, a security professional, uses a tool to monitor her company's website, analyze the website's traffic, and track the geographical location of the users visiting the company's website. Which of the following tools did Taylor employ in the above scenario?

  1. A. WebSite Watcher
  2. B. web-Stat
  3. C. Webroot
  4. D. WAFW00F

Correct Answer: B
Increase your web site’s performance and grow! Add Web-Stat to your site (it’s free!) and watch individuals act together with your pages in real time.
Learn how individuals realize your web site. Get details concerning every visitor’s path through your web site and track pages that flip browsers into consumers.
One-click install. observe locations, in operation systems, browsers and screen sizes and obtain alerts for new guests and conversions

QUESTION 135

A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted.
Which cryptography attack is the student attempting?

  1. A. Man-in-the-middle attack
  2. B. Brute-force attack
  3. C. Dictionary attack
  4. D. Session hijacking

Correct Answer: C

Page 28 of 106

Post your Comments and Discuss EC-Council 312-50v11 exam with other Community members: