EC-Council 312-50v11 Certified Ethical Hacker Exam – C|EH v11 Online Training
EC-Council 312-50v11 Online Training
The questions for 312-50v11 were last updated at May 10,2025.
- Exam Code: 312-50v11
- Exam Name: Certified Ethical Hacker Exam - C|EH v11
- Certification Provider: EC-Council
- Latest update: May 10,2025
DNS cache snooping is a process of determining if the specified resource address is present in the DNS cache records. It may be useful during the examination of the network to determine what software update resources are used, thus discovering what software is installed.
What command is used to determine if the entry is present in DNS cache?
- A . nslookup -fullrecursive update.antivirus.com
- B . dnsnooping Crt update.antivirus.com
- C . nslookup -norecursive update.antivirus.com
- D . dns –snoop update.antivirus.com
What is the purpose of DNS AAAA record?
- A . Authorization, Authentication and Auditing record
- B . Address prefix record
- C . Address database record
- D . IPv6 address resolution record
Log monitoring tools performing behavioral analysis have alerted several suspicious logins on a Linux server occurring during non-business hours. After further examination of all login activities, it is noticed that none of the logins have occurred during typical work hours. A Linux administrator who is investigating this problem realizes the system time on the Linux server is wrong by more than twelve hours .
What protocol used on Linux servers to synchronize the time has stopped working?
- A . Time Keeper
- B . NTP
- C . PPP
- D . OSPP
What does a firewall check to prevent particular ports and applications from getting packets into an organization?
- A . Transport layer port numbers and application layer headers
- B . Presentation layer headers and the session layer port numbers
- C . Network layer headers and the session layer port numbers
- D . Application layer port numbers and the transport layer headers
An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up.
What is the most likely cause?
- A . The network devices are not all synchronized.
- B . Proper chain of custody was not observed while collecting the logs.
- C . The attacker altered or erased events from the logs.
- D . The security breach was a false positive.
To create a botnet. the attacker can use several techniques to scan vulnerable machines. The attacker first collects Information about a large number of vulnerable machines to create a list. Subsequently, they infect the machines. The list Is divided by assigning half of the list to the newly compromised machines. The scanning process runs simultaneously. This technique ensures the spreading and installation of malicious code in little time.
Which technique is discussed here?
- A . Hit-list-scanning technique
- B . Topological scanning technique
- C . Subnet scanning technique
- D . Permutation scanning technique
Henry is a penetration tester who works for XYZ organization. While performing enumeration on a client organization, he queries the DNS server for a specific cached DNS record. Further, by using this cached record, he determines the sites recently visited by the organization’s user .
What is the enumeration technique used by Henry on the organization?
- A . DNS zone walking
- B . DNS cache snooping
- C . DNS SEC zone walking
- D . DNS cache poisoning
Alice needs to send a confidential document to her coworker. Bryan. Their company has public key infrastructure set up. Therefore. Alice both encrypts the message and digitally signs it. Alice uses_______to encrypt the message, and Bryan uses__________to confirm the digital signature.
- A . Bryan’s public key; Bryan’s public key
- B . Alice’s public key; Alice’s public key
- C . Bryan’s private key; Alice’s public key
- D . Bryan’s public key; Alice’s public key
You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine .
What Wireshark filter will show the connections from the snort machine to kiwi syslog machine?
- A . tcp.srcport= = 514 && ip.src= = 192.168.0.99
- B . tcp.srcport= = 514 && ip.src= = 192.168.150
- C . tcp.dstport= = 514 && ip.dst= = 192.168.0.99
- D . tcp.dstport= = 514 && ip.dst= = 192.168.0.150
Which regulation defines security and privacy controls for Federal information systems and organizations?
- A . HIPAA
- B . EU Safe Harbor
- C . PCI-DSS
- D . NIST-800-53