312-50v11 Dumps

312-50v11 Free Practice Test

EC-Council 312-50v11: Certified Ethical Hacker Exam (CEH v11)

QUESTION 1

Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?

Correct Answer: D

QUESTION 2

Which of the following is the primary objective of a rootkit?

Correct Answer: C

QUESTION 3

Shellshock allowed an unauthorized user to gain access to a server. It affected many Internet-facing services, which OS did it not directly affect?

Correct Answer: D

QUESTION 4

When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of the SYN/ACK before the connection is established. This is referred to as the "TCP three-way handshake." While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK.
How would an attacker exploit this design by launching TCP SYN attack?

Correct Answer: B

QUESTION 5

What is the main security service a cryptographic hash provides?

Correct Answer: D