EC-Council 312-50v11 Certified Ethical Hacker Exam – C|EH v11 Online Training
EC-Council 312-50v11 Online Training
The questions for 312-50v11 were last updated at Sep 07,2025.
- Exam Code: 312-50v11
- Exam Name: Certified Ethical Hacker Exam - C|EH v11
- Certification Provider: EC-Council
- Latest update: Sep 07,2025
A large mobile telephony and data network operator has a data center that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems.
What is the best security policy concerning this setup?
- A . Network elements must be hardened with user ids and strong passwords. Regular security tests and audits should be performed.
- B . As long as the physical access to the network elements is restricted, there is no need for additional measures.
- C . There is no need for specific security measures on the network elements as long as firewalls and IPS systems exist.
- D . The operator knows that attacks and down time are inevitable and should have a backup site.
You went to great lengths to install all the necessary technologies to prevent hacking attacks, such as expensive firewalls, antivirus software, anti-spam systems and intrusion detection/prevention tools in your company’s network. You have configured the most secure policies and tightened every device on your network. You are confident that hackers will never be able to gain access to your network with complex security system in place.
Your peer, Peter Smith who works at the same department disagrees with you.
He says even the best network security technologies cannot prevent hackers gaining access to the network because of presence of "weakest link" in the security chain.
What is Peter Smith talking about?
- A . Untrained staff or ignorant computer users who inadvertently become the weakest link in your security chain
- B . "zero-day" exploits are the weakest link in the security chain since the IDS will not be able to detect these attacks
- C . "Polymorphic viruses" are the weakest link in the security chain since the Anti-Virus scanners will not be able to detect these attacks
- D . Continuous Spam e-mails cannot be blocked by your security system since spammers use different techniques to bypass the filters in your gateway
What is a NULL scan?
- A . A scan in which all flags are turned off
- B . A scan in which certain flags are off
- C . A scan in which all flags are on
- D . A scan in which the packet size is set to zero
- E . A scan with an illegal packet size
To invisibly maintain access to a machine, an attacker utilizes a toolkit that sits undetected In the core components of the operating system .
What is this type of rootkit an example of?
- A . Mypervisor rootkit
- B . Kernel toolkit
- C . Hardware rootkit
- D . Firmware rootkit