312-50v11 Dumps

312-50v11 Free Practice Test

EC-Council 312-50v11: Certified Ethical Hacker Exam (CEH v11)

QUESTION 66

Which of the following LM hashes represent a password of less than 8 characters? (Choose two.)

Correct Answer: BE

QUESTION 67

Which of the following is the BEST way to defend against network sniffing?

Correct Answer: A

QUESTION 68

On performing a risk assessment, you need to determine the potential impacts when some of the critical business processes of the company interrupt its service.
What is the name of the process by which you can determine those critical businesses?

Correct Answer: B

QUESTION 69

Harris is attempting to identify the OS running on his target machine. He inspected the initial TTL in the IP header and the related TCP window size and obtained the following results:
TTL: 64 Window Size: 5840
What is the OS running on the target machine?

Correct Answer: D

QUESTION 70

Geena, a cloud architect, uses a master component in the Kubernetes cluster architecture that scans newly generated pods and allocates a node to them. This component can also assign nodes based on factors such as the overall resource requirement, data locality, software/hardware/policy restrictions, and internal workload interventions.
Which of the following master components is explained in the above scenario?

Correct Answer: B