A Review Of Realistic 312-50v11 Testing Engine

Certleader 312-50v11 Questions are updated and all 312-50v11 answers are verified by experts. Once you have completely prepared with our 312-50v11 exam prep kits you will be ready for the real 312-50v11 exam without a problem. We have Renovate EC-Council 312-50v11 dumps study guide. PASSED 312-50v11 First attempt! Here What I Did.

Also have 312-50v11 free dumps questions for you:

Page: 1 / 21
Total 254 questions Full Exam Access
Question 1
You went to great lengths to install all the necessary technologies to prevent hacking attacks, such as expensive firewalls, antivirus software, anti-spam systems and intrusion detection/prevention tools in your company's network. You have configured the most secure policies and tightened every device on your network. You are confident that hackers will never be able to gain access to your network with complex security system in place.
Your peer, Peter Smith who works at the same department disagrees with you.
He says even the best network security technologies cannot prevent hackers gaining access to the network because of presence of "weakest link" in the security chain.
What is Peter Smith talking about?
My answer: -
Reference answer: A
Reference analysis:

None

Question 2
A network administrator discovers several unknown files in the root directory of his Linux FTP server. One of the files is a tarball, two are shell script files, and the third is a binary file is named "nc." The FTP server's access logs show that the anonymous user account logged in to the server, uploaded the files, and extracted the contents of the tarball and ran the script using a function provided by the FTP server's software. The “ps” command shows that the “nc” file is running as process, and the netstat command shows the “nc” process is listening on a network port.
What kind of vulnerability must be present to make this remote attack possible?
My answer: -
Reference answer: A
Reference analysis:

None

Question 3
Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.
My answer: -
Reference answer: B
Reference analysis:

None

Question 4
As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing.
What document describes the specifics of the testing, the associated violations, and essentially protects both the organization’s interest and your liabilities as a tester?
My answer: -
Reference answer: C
Reference analysis:

None

Question 5
A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the Prometric Online Testing – Reports https://ibt1.prometric.com/users/custom/report_queue/rq_str... corporate network. What tool should the analyst use to perform a Blackjacking attack?
My answer: -
Reference answer: B
Reference analysis:

None

Question 6
Which type of security feature stops vehicles from crashing through the doors of a building?
My answer: -
Reference answer: A
Reference analysis:

None

Question 7
Why should the security analyst disable/remove unnecessary ISAPI filters?
My answer: -
Reference answer: B
Reference analysis:

None

Question 8
An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", the user is directed to a phishing site.
Which file does the attacker need to modify?
My answer: -
Reference answer: D
Reference analysis:

None

Question 9
Which of the following incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an organization?
My answer: -
Reference answer: A
Reference analysis:

None

Question 10
A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer’s software and hardware without the owner’s permission. Their intention can either be to simply gain knowledge or to illegally make changes.
Which of the following class of hacker refers to an individual who works both offensively and defensively at various times?
My answer: -
Reference answer: C
Reference analysis:

None

Question 11
By using a smart card and pin, you are using a two-factor authentication that satisfies
My answer: -
Reference answer: B
Reference analysis:

None

Question 12
In this attack, a victim receives an e-mail claiming from PayPal stating that their account has been disabled and confirmation is required before activation. The attackers then scam to collect not one but two credit card numbers, ATM PIN number and other personal details. Ignorant users usually fall prey to this scam. Which of the following statement is incorrect related to this attack?
My answer: -
Reference answer: D
Reference analysis:

None

Question 13
Yancey is a network security administrator for a large electric company. This company provides power for over 100, 000 people in Las Vegas. Yancey has worked for his company for over 15 years and has become very successful. One day, Yancey comes in to work and finds out that the company will be downsizing and he will be out of a job in two weeks. Yancey is very angry and decides to place logic bombs, viruses, Trojans, and backdoors all over the network to take down the company once he has left. Yancey does not care if his actions land him in jail for 30 or more years, he just wants the company to pay for what they are doing to him.
What would Yancey be considered?
My answer: -
Reference answer: A
Reference analysis:

None

Question 14
An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the network’s external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file. What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?
My answer: -
Reference answer: A
Reference analysis:

None

Question 15
Scenario1:
* 1. Victim opens the attacker's web site.
* 2. Attacker sets up a web site which contains interesting and attractive content like 'Do you want to make
$1000 in a day?'.
* 3. Victim clicks to the interesting and attractive content URL.
* 4. Attacker creates a transparent 'iframe' in front of the URL which victim attempts to click, so victim thinks that he/she clicks to the 'Do you want to make $1000 in a day?' URL but actually he/she clicks to the content or URL that exists in the transparent 'iframe' which is setup by the attacker.
What is the name of the attack which is mentioned in the scenario?
My answer: -
Reference answer: D
Reference analysis:

None

Question 16
What does a firewall check to prevent particular ports and applications from getting packets into an organization?
My answer: -
Reference answer: A
Reference analysis:

None

Question 17
What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?
My answer: -
Reference answer: E
Reference analysis:

None

Question 18
To reach a bank web site, the traffic from workstations must pass through a firewall. You have been asked to review the firewall configuration to ensure that workstations in network 10.10.10.0/24 can only reach the bank web site 10.20.20.1 using https. Which of the following firewall rules meets this requirement?
My answer: -
Reference answer: A
Reference analysis:

None

Question 19
You have gained physical access to a Windows 2008 R2 server which has an accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your toolkit, you have an Ubuntu 9.10 Linux LiveCD. Which Linux-based tool can change any user’s password or activate disabled Windows accounts?
My answer: -
Reference answer: C
Reference analysis:

None

Question 20
What tool can crack Windows SMB passwords simply by listening to network traffic?
My answer: -
Reference answer: D
Reference analysis:

None

Question 21
Which address translation scheme would allow a single public IP address to always correspond to a single machine on an internal network, allowing "server publishing"?
My answer: -
Reference answer: D
Reference analysis:

None

Question 22
Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access.
A camera captures people walking and identifies the individuals using Steve’s approach.
After that, people must approximate their RFID badges. Both the identifications are required to open the door. In this case, we can say:
My answer: -
Reference answer: B
Reference analysis:

None

Question 23
When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator’s Computer to update the router configuration. What type of an alert is this?
My answer: -
Reference answer: D
Reference analysis:

None

Question 24
Fingerprinting an Operating System helps a cracker because:
My answer: -
Reference answer: D
Reference analysis:

None

Page: 1 / 21
Total 254 questions Full Exam Access