Which type of malware spreads from one system to another or from one network to another and causes similar types of damage as viruses do to the infected system?
A . Rootkit
B . Trojan
C . A Worm
D . Adware
Answer: C
312-50v11 Certified Ethical Hacker Exam – C|EH v11 exam is a hot EC-Council certification exam, Exam4Training offers you the latest free online 312-50v11 dumps to practice. You can get online training in the following questions, all these questions are verified by EC-Council experts. If this exam changed, we will share new update questions.
Which type of malware spreads from one system to another or from one network to another and causes similar types of damage as viruses do to the infected system?
A . Rootkit
B . Trojan
C . A Worm
D . Adware
Answer: C
Bob received this text message on his mobile phone: “Hello, this is Scott Smelby from the Yahoo Bank. Kindly contact me for a vital transaction on: [email protected]” .
Which statement below is true?
A . This is a scam as everybody can get a @yahoo address, not the Yahoo customer service employees.
B . This is a scam because Bob does not know Scott.
C . Bob should write to [email protected] to verify the identity of Scott.
D . This is probably a legitimate message as it comes from a respectable organization.
Answer: A
Mike, a security engineer, was recently hired by BigFox Ltd. The company recently experienced disastrous DoS attacks. The management had instructed Mike to build defensive strategies for the company’s IT infrastructure to thwart DoS/DDoS attacks. Mike deployed some countermeasures to handle jamming and scrambling attacks .
What is the countermeasure Mike applied to defend against jamming and scrambling attacks?
A . Allow the usage of functions such as gets and strcpy
B . Allow the transmission of all types of addressed packets at the ISP level
C . Implement cognitive radios in the physical layer
D . A Disable TCP SYN cookie protection
Answer: D
In Trojan terminology, what is a covert channel?
A . A channel that transfers information within a computer system or network in a way that violates the security policy
B . A legitimate communication path within a computer system or network for transfer of data
C . It is a kernel operation that hides boot processes and services to mask detection
D . It is Reverse tunneling technique that uses HTTPS protocol instead of HTTP protocol to establish connections
Answer: A
Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?
A . symmetric algorithms
B . asymmetric algorithms
C . hashing algorithms
D . integrity algorithms
Answer: C
This TCP flag instructs the sending system to transmit all buffered data immediately.
A . SYN
B . RST
C . PSH
D . URG
E . FIN
Answer: C
What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?
A . Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.
B . Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.
C . Symmetric encryption allows the server to securely transmit the session keys out-of-band.
D . Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.
Answer: D
Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating that the port is closed.
What is the port scanning technique used by Sam to discover open ports?
A . Xmas scan
B . IDLE/IPID header scan
C . TCP Maimon scan
D . ACK flag probe scan
Answer: D
An attacker utilizes a Wi-Fi Pineapple to run an access point with a legitimate-looking SSID for a nearby business in order to capture the wireless password .
What kind of attack is this?
A . MAC spoofing attack
B . Evil-twin attack
C . War driving attack
D . Phishing attack
Answer: B
An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up.
What is the most likely cause?
A . The network devices are not all synchronized.
B . Proper chain of custody was not observed while collecting the logs.
C . The attacker altered or erased events from the logs.
D . The security breach was a false positive.
Answer: A