EC-Council 312-50v11 Certified Ethical Hacker Exam – C|EH v11 Online Training
EC-Council 312-50v11 Online Training
The questions for 312-50v11 were last updated at May 10,2025.
- Exam Code: 312-50v11
- Exam Name: Certified Ethical Hacker Exam - C|EH v11
- Certification Provider: EC-Council
- Latest update: May 10,2025
Which of the following is the least-likely physical characteristic to be used in biometric control that supports a large company?
- A . Iris patterns
- B . Voice
- C . Height and Weight
- D . Fingerprints
Tony is a penetration tester tasked with performing a penetration test. After gaining initial access to a target system, he finds a list of hashed passwords.
Which of the following tools would not be useful for cracking the hashed passwords?
- A . John the Ripper
- B . Hashcat
- C . netcat
- D . THC-Hydra
In Trojan terminology, what is a covert channel?
- A . A channel that transfers information within a computer system or network in a way that violates the security policy
- B . A legitimate communication path within a computer system or network for transfer of data
- C . It is a kernel operation that hides boot processes and services to mask detection
- D . It is Reverse tunneling technique that uses HTTPS protocol instead of HTTP protocol to establish connections
Bob received this text message on his mobile phone: “Hello, this is Scott Smelby from the Yahoo Bank. Kindly contact me for a vital transaction on: [email protected]” .
Which statement below is true?
- A . This is a scam as everybody can get a @yahoo address, not the Yahoo customer service employees.
- B . This is a scam because Bob does not know Scott.
- C . Bob should write to [email protected] to verify the identity of Scott.
- D . This is probably a legitimate message as it comes from a respectable organization.
Which protocol is used for setting up secure channels between two devices, typically in
VPNs?
- A . PEM
- B . ppp
- C . IPSEC
- D . SET
An organization has automated the operation of critical infrastructure from a remote location. For this purpose, all the industrial control systems are connected to the Internet. To empower the manufacturing process, ensure the reliability of industrial networks, and reduce downtime and service disruption, the organization deckled to install an OT security tool that further protects against security incidents such as cyber espionage, zero-day attacks, and malware .
Which of the following tools must the organization employ to protect its critical infrastructure?
- A . Robotium
- B . BalenaCloud
- C . Flowmon
- D . IntentFuzzer
An Internet Service Provider (ISP) has a need to authenticate users connecting via analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network.
Which AAA protocol is the most likely able to handle this requirement?
- A . TACACS+
- B . DIAMETER
- C . Kerberos
- D . RADIUS
Which of the following is the structure designed to verify and authenticate the identity of individuals within the enterprise taking part in a data exchange?
- A . SOA
- B . biometrics
- C . single sign on
- D . PKI
Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end-to-end encryption of the connection?
- A . SFTP
- B . Ipsec
- C . SSL
- D . FTPS
An attacker changes the profile information of a particular user (victim) on the target website. The attacker uses this string to update the victim’s profile to a text file and then submit the data to the attacker’s database.
< iframe src=““http://www.vulnweb.com/updateif.php”” style=““display:none””</iframe> >
What is this type of attack (that can use either HTTP GET or HTTP POST) called?
- A . Browser Hacking
- B . Cross-Site Scripting
- C . SQL Injection
- D . Cross-Site Request Forgery