EC-Council 312-50v11 Certified Ethical Hacker Exam – C|EH v11 Online Training
EC-Council 312-50v11 Online Training
The questions for 312-50v11 were last updated at May 10,2025.
- Exam Code: 312-50v11
- Exam Name: Certified Ethical Hacker Exam - C|EH v11
- Certification Provider: EC-Council
- Latest update: May 10,2025
What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?
- A . Residual risk
- B . Impact risk
- C . Deferred risk
- D . Inherent risk
CORRECT TEXT
A group of hackers were roaming around a bank office building in a city, driving a luxury car. They were using hacking tools on their laptop with the intention to find a free-access wireless network .
What is
- A . this hacking process known as?
- B . GPS mapping
- C . Spectrum analysis
- D . Wardriving Wireless sniffing
CORRECT TEXT
A group of hackers were roaming around a bank office building in a city, driving a luxury car. They were using hacking tools on their laptop with the intention to find a free-access wireless network .
What is
- A . this hacking process known as?
- B . GPS mapping
- C . Spectrum analysis
- D . Wardriving Wireless sniffing
CORRECT TEXT
A group of hackers were roaming around a bank office building in a city, driving a luxury car. They were using hacking tools on their laptop with the intention to find a free-access wireless network .
What is
- A . this hacking process known as?
- B . GPS mapping
- C . Spectrum analysis
- D . Wardriving Wireless sniffing
CORRECT TEXT
A group of hackers were roaming around a bank office building in a city, driving a luxury car. They were using hacking tools on their laptop with the intention to find a free-access wireless network .
What is
- A . this hacking process known as?
- B . GPS mapping
- C . Spectrum analysis
- D . Wardriving Wireless sniffing
CORRECT TEXT
A group of hackers were roaming around a bank office building in a city, driving a luxury car. They were using hacking tools on their laptop with the intention to find a free-access wireless network .
What is
- A . this hacking process known as?
- B . GPS mapping
- C . Spectrum analysis
- D . Wardriving Wireless sniffing
Attacker creates a transparent ‘iframe’ in front of the URL which victim attempts to click, so victim thinks that he/she clicks to the ‘Do you want to make $1000 in a day?’ URL but actually he/she clicks to the content or URL that exists in the transparent ‘iframe’ which is setup by the attacker.
What is the name of the attack which is mentioned in the scenario?
- A . Session Fixation
- B . HTML Injection
- C . HTTP Parameter Pollution
- D . Clickjacking Attack
On performing a risk assessment, you need to determine the potential impacts when some of the critical business processes of the company interrupt its service.
What is the name of the process by which you can determine those critical businesses?
- A . Emergency Plan Response (EPR)
- B . Business Impact Analysis (BIA)
- C . Risk Mitigation
- D . Disaster Recovery Planning (DRP)
A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server.
Based on this information, what should be one of your key recommendations to the bank?
- A . Place a front-end web server in a demilitarized zone that only handles external web traffic
- B . Require all employees to change their anti-virus program with a new one
- C . Move the financial data to another server on the same IP subnet
- D . Issue new certificates to the web servers from the root certificate authority
Which of the following DoS tools is used to attack target web applications by starvation of available sessions on the web server?
The tool keeps sessions at halt using never-ending POST transmissions and sending an arbitrarily large content-length header value.
- A . My Doom
- B . Astacheldraht
- C . R-U-Dead-Yet?(RUDY)
- D . LOIC