Eccouncil: Certified Ethical Hacker Exam (Ceh V11)
Eccouncil: Certified Ethical Hacker Exam (Ceh V11)
Eccouncil: Certified Ethical Hacker Exam (Ceh V11)
312-50v11
Certified Ethical
Hacker Exam (CEH
v11)
Version: Demo
Email: support@marks4sure.com
IMPORTANT NOTICE
Feedback
We have developed quality product and state-of-art service to ensure our customers interest. If you have any
suggestions, please feel free to contact us at feedback@marks4sure.com
Support
If you have any questions about our product, please provide the following items:
exam code
screenshot of the question
login id/email
please contact us at support@marks4sure.com and our technical experts will provide support within 24 hours.
Copyright
The product of each order has its own encryption code, so you should use it independently. Any unauthorized
changes will inflict legal punishment. We reserve the right of final explanation for this statement.
Practice Test ECCouncil - 312-50v11
Question #:1
From the options below, choose the exploit against which this rule applies.
A. WebDav
B. SQL Slammer
C. MS Blaster
D. MyDoom
Answer: C
Question #:2
You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all
machines in the same network quickly.
What is the best Nmap command you will use? A. nmap -T4 -q 10.10.0.0/24
Question #:3
A. Netsh
B.
B. Netstat
D. Net use
Answer: A
Question #:4
Ethical backer jane Doe is attempting to crack the password of the head of the it department of ABC company.
She Is utilizing a rainbow table and notices upon entering a password that extra characters are added to the
password after submitting. What countermeasure is the company using to protect against rainbow tables?
B. Password salting
C. Password hashing
D. Account lockout
Answer: B
Explanation
Passwords are usually delineated as “hashed and salted”. salting is simply the addition of a unique, random
string of characters renowned solely to the site to every parole before it’s hashed, typically this “salt” is placed
in front of each password.
The salt value needs to be hold on by the site, which means typically sites use the same salt for each parole.
This makes it less effective than if individual salts are used.
The use of unique salts means that common passwords shared by multiple users – like “123456” or
“password” – aren’t revealed revealed when one such hashed password is known – because despite the
passwords being the same the immediately and hashed values are not.
Large salts also protect against certain methods of attack on hashes, including rainbow tables or logs of hashed
passwords previously broken.
Both hashing and salting may be repeated more than once to increase the issue in breaking the security.
Question #:5
An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and
Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of
security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of
the logged events do not match up.
B. Proper chain of custody was not observed while collecting the logs.
Answer: A
Question #:6
In the context of password security, a simple dictionary attack involves loading a dictionary file (a text file full
of dictionary words) into a cracking application such as L0phtCrack or John the Ripper, and running it against
user accounts located by the application. The larger the word and word fragment selection, the more effective
the dictionary attack is. The brute force method is the most inclusive, although slow. It usually tries every
possible letter and number combination in its automated exploration. If you would use both brute force and
dictionary methods combined together to have variation of words, what would you call such an attack?
A. Full Blown
B. Thorough
C. Hybrid
D. BruteDics
Answer: C
Question #:7
Based on the following extract from the log of a compromised machine, what is the hacker really trying to
steal?
A. har.txt
B. SAM file
C. wwwroot
D. Repair file
Answer: B
Question #:8
John wants to send Marie an email that includes sensitive information, and he does not trust the network that
he is connected to. Marie gives him the idea of using PGP. What should John do to communicate correctly
using this type of encryption?
Answer: B
Question #:9
While scanning with Nmap, Patin found several hosts which have the IP ID of incremental sequences. He then
decided to conduct: nmap -Pn -p- -si kiosk.adobe.com www.riaa.com. kiosk.adobe.com is the host with
incremental IP ID sequence. What is the purpose of using "-si" with Nmap?
Answer: A
Question #:10
Due to a slowdown of normal network operations, the IT department decided to monitor internet traffic for all
of the employees. From a legal standpoint, what would be troublesome to take this kind of measure?
C. Not informing the employees that they are going to be monitored could be an invasion of privacy.
Answer: C
We help you pass any IT / Business Certification Exams with 100% Pass Guaranteed or Full Refund. Especially
Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper, Check Point, LPI, Nortel, EXIN and so on.
We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses listed
below.
Sales: sales@marks4sure.com
Feedback: feedback@marks4sure.com
Support: support@marks4sure.com
Any problems about IT certification or our products, You can write us back and we will get back to you within 24
hours.