EC-Council 312-50v11 Certified Ethical Hacker Exam – C|EH v11 Online Training
EC-Council 312-50v11 Online Training
The questions for 312-50v11 were last updated at Sep 07,2025.
- Exam Code: 312-50v11
- Exam Name: Certified Ethical Hacker Exam - C|EH v11
- Certification Provider: EC-Council
- Latest update: Sep 07,2025
George is a security professional working for iTech Solutions. He was tasked with securely transferring sensitive data of the organization between industrial systems. In this process, he used a short-range communication protocol based on the IEEE 203.15.4 standard. This protocol is used in devices that transfer data infrequently at a low rate in a restricted area, within a range of 10-100 m .
What is the short-range wireless communication technology George employed in the above scenario?
- A . MQTT
- B . LPWAN
- C . Zigbee
- D . NB-IoT
Larry, a security professional in an organization, has noticed some abnormalities In the user accounts on a web server. To thwart evolving attacks, he decided to harden the security of the web server by adopting a countermeasures to secure the accounts on the web server.
Which of the following countermeasures must Larry implement to secure the user accounts on the web server?
- A . Enable unused default user accounts created during the installation of an OS
- B . Enable all non-interactive accounts that should exist but do not require interactive login
- C . Limit the administrator or toot-level access to the minimum number of users
- D . Retain all unused modules and application extensions
When purchasing a biometric system, one of the considerations that should be reviewed is the processing speed .
Which of the following best describes what it is meant by processing?
- A . The amount of time and resources that are necessary to maintain a biometric system
- B . How long it takes to setup individual user accounts
- C . The amount of time it takes to be either accepted or rejected from when an individual provides identification and authentication information
- D . The amount of time it takes to convert biometric data into a template on a smart card
Internet Protocol Security IPsec is actually a suite pf protocols. Each protocol within the suite provides different functionality. Collective IPsec does everything except.
- A . Protect the payload and the headers
- B . Encrypt
- C . Work at the Data Link Layer
- D . Authenticate
You have successfully logged on a Linux system. You want to now cover your trade Your login attempt may be logged on several files located in /var/log .
Which file does NOT belongs to the list:
- A . user.log
- B . auth.fesg
- C . wtmp
- D . btmp
The Payment Card Industry Data Security Standard (PCI DSS) contains six different categories of control objectives. Each objective contains one or more requirements, which must be followed in order to achieve compliance .
Which of the following requirements would best fit under the objective, "Implement strong access control measures"?
- A . Regularly test security systems and processes.
- B . Encrypt transmission of cardholder data across open, public networks.
- C . Assign a unique ID to each person with computer access.
- D . Use and regularly update anti-virus software on all systems commonly affected by malware.
Tremp is an IT Security Manager, and he is planning to deploy an IDS in his small company.
He is looking for an IDS with the following characteristics:
– Verifies success or failure of an attack
– Monitors system activities Detects attacks that a network-based IDS fails to detect
– Near real-time detection and response
– Does not require additional hardware
– Lower entry cost Which type of IDS is best suited for Tremp’s requirements?
- A . Gateway-based IDS
- B . Network-based IDS
- C . Host-based IDS
- D . Open source-based
What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?
- A . Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.
- B . Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.
- C . Symmetric encryption allows the server to securely transmit the session keys out-of-band.
- D . Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.
What is not a PCI compliance recommendation?
- A . Use a firewall between the public network and the payment card data.
- B . Use encryption to protect all transmission of card holder data over any public network.
- C . Rotate employees handling credit card transactions on a yearly basis to different departments.
- D . Limit access to card holder data to as few individuals as possible.
A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing in concluding the Operating System (OS) version installed.
Considering that NMAP result below, which of the following is likely to be installed on the target machine by the OS?
Starting NMAP 5.21 at 2011-03-15 11:06 NMAP scan report for 172.16.40.65 Host is up (1.00s latency). Not shown: 993 closed ports PORT STATE SERVICE 21/tcp open ftp 23/tcp open telnet 80/tcp open http 139/tcp open netbios-ssn 515/tcp open 631/tcp open ipp 9100/tcp open MAC Address: 00:00:48:0D:EE:8
- A . The host is likely a Linux machine.
- B . The host is likely a printer.
- C . The host is likely a router.
- D . The host is likely a Windows machine.