Free 312-50v11 Exam Braindumps

Pass your Certified Ethical Hacker Exam (CEH v11) exam with these free Questions and Answers

Page 29 of 106
QUESTION 136

Nathan is testing some of his network devices. Nathan is using Macof to try and flood the ARP cache of these switches.
If these switches' ARP cache is successfully flooded, what will be the result?

  1. A. The switches will drop into hub mode if the ARP cache is successfully flooded.
  2. B. If the ARP cache is flooded, the switches will drop into pix mode making it less susceptible to attacks.
  3. C. Depending on the switch manufacturer, the device will either delete every entry in its ARP cache or reroute packets to the nearest switch.
  4. D. The switches will route all traffic to the broadcast address created collisions.

Correct Answer: A

QUESTION 137

Sam is working as a system administrator In an organization. He captured the principal characteristics of a vulnerability and produced a numerical score to reflect Its severity using CVSS v3.0 to property assess and prioritize the organization's vulnerability management processes. The base score that Sam obtained after performing cvss rating was 4.0. What is the CVSS severity level of the vulnerability discovered by Sam in the above scenario?

  1. A. Medium
  2. B. Low
  3. C. Critical
  4. D. High

Correct Answer: A
Rating CVSS Score None 0.0
Low 0.1 - 3.9
Medium 4.0 - 6.9
High 7.0 - 8.9
Critical 9.0 - 10.0

QUESTION 138

Fingerprinting an Operating System helps a cracker because:

  1. A. It defines exactly what software you have installed
  2. B. It opens a security-delayed window based on the port being scanned
  3. C. It doesn't depend on the patches that have been applied to fix existing security holes
  4. D. It informs the cracker of which vulnerabilities he may be able to exploit on your system

Correct Answer: D

QUESTION 139

Attacker Simon targeted the communication network of an organization and disabled the security controls of NetNTLMvl by modifying the values of LMCompatibilityLevel, NTLMMinClientSec, and RestrictSendingNTLMTraffic. He then extracted all the non-network logon tokens from all the active processes to masquerade as a legitimate user to launch further attacks. What is the type of attack performed by Simon?

  1. A. Internal monologue attack
  2. B. Combinator attack
  3. C. Rainbow table attack
  4. D. Dictionary attack

Correct Answer: A

QUESTION 140

You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration? alert tcp any any -> 192.168.100.0/24 21 (msg: ““FTP on the network!””;)

  1. A. A firewall IPTable
  2. B. FTP Server rule
  3. C. A Router IPTable
  4. D. An Intrusion Detection System

Correct Answer: D

Page 29 of 106

Post your Comments and Discuss EC-Council 312-50v11 exam with other Community members: