EC-Council 312-50v11 Certified Ethical Hacker Exam – C|EH v11 Online Training
EC-Council 312-50v11 Online Training
The questions for 312-50v11 were last updated at Jul 18,2025.
- Exam Code: 312-50v11
- Exam Name: Certified Ethical Hacker Exam - C|EH v11
- Certification Provider: EC-Council
- Latest update: Jul 18,2025
Samuel, a professional hacker, monitored and Intercepted already established traffic between Bob and a host machine to predict Bob’s ISN. Using this ISN, Samuel sent spoofed packets with Bob’s IP address to the host machine. The host machine responded with <| packet having an Incremented ISN. Consequently. Bob’s connection got hung, and Samuel was able to communicate with the host machine on behalf of Bob .
What is the type of attack performed by Samuel in the above scenario?
- A . UDP hijacking
- B . Blind hijacking
- C . TCP/IP hacking
- D . Forbidden attack
In the context of Windows Security, what is a ‘null’ user?
- A . A user that has no skills
- B . An account that has been suspended by the admin
- C . A pseudo account that has no username and password
- D . A pseudo account that was created for security administration purpose
This TCP flag instructs the sending system to transmit all buffered data immediately.
- A . SYN
- B . RST
- C . PSH
- D . URG
- E . FIN
When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of the SYN/ACK before the connection is established. This is referred to as the "TCP three-way handshake." While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK.
How would an attacker exploit this design by launching TCP SYN attack?
- A . Attacker generates TCP SYN packets with random destination addresses towards a victim host
- B . Attacker floods TCP SYN packets with random source addresses towards a victim host
- C . Attacker generates TCP ACK packets with random source addresses towards a victim host
- D . Attacker generates TCP RST packets with random source addresses towards a victim host
Elante company has recently hired James as a penetration tester. He was tasked with performing enumeration on an organization’s network. In the process of enumeration, James discovered a service that is accessible to external sources. This service runs directly on port 21 .
What is the service enumerated byjames in the above scenario?
- A . Border Gateway Protocol (BGP)
- B . File Transfer Protocol (FTP)
- C . Network File System (NFS)
- D . Remote procedure call (RPC)
When you are testing a web application, it is very useful to employ a proxy tool to save every request and response. You can manually test every request and analyze the response to find vulnerabilities. You can test parameter and headers manually to get more precise results than if using web vulnerability scanners.
What proxy tool will help you find web vulnerabilities?
- A . Maskgen
- B . Dimitry
- C . Burpsuite
- D . Proxychains
in an attempt to increase the security of your network, you Implement a solution that will help keep your wireless network undiscoverable and accessible only to those that know It .
How do you accomplish this?
- A . Delete the wireless network
- B . Remove all passwords
- C . Lock all users
- D . Disable SSID broadcasting
Which of the following programming languages is most susceptible to buffer overflow attacks, due to its lack of a built-in bounds checking mechanism?
Code:
#include <string.h> int main(){char buffer[8];
strcpy(buffer, ““11111111111111111111111111111””);} Output: Segmentation fault
- A . C#
- B . Python
- C . Java
- D . C++
Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?
- A . symmetric algorithms
- B . asymmetric algorithms
- C . hashing algorithms
- D . integrity algorithms
Which among the following is the best example of the hacking concept called "clearing tracks"?
- A . After a system is breached, a hacker creates a backdoor to allow re-entry into a system.
- B . During a cyberattack, a hacker injects a rootkit into a server.
- C . An attacker gains access to a server through an exploitable vulnerability.
- D . During a cyberattack, a hacker corrupts the event logs on all machines.