312-50v11 Dumps

312-50v11 Free Practice Test

EC-Council 312-50v11: Certified Ethical Hacker Exam (CEH v11)

QUESTION 131

An attacker identified that a user and an access point are both compatible with WPA2 and WPA3 encryption. The attacker installed a rogue access point with only WPA2 compatibility in the vicinity and forced the victim to go through the WPA2 four-way handshake to get connected. After the connection was established, the attacker used automated tools to crack WPA2-encrypted messages. What is the attack performed in the above scenario?

Correct Answer: B

QUESTION 132

Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?

Correct Answer: A

QUESTION 133

Let's imagine three companies (A, B and C), all competing in a challenging global environment. Company A and B are working together in developing a product that will generate a major competitive advantage for them. Company A has a secure DNS server while company B has a DNS server vulnerable to spoofing. With a spoofing attack on the DNS server of company B, company C gains access to outgoing e-mails from company

Correct Answer: C

QUESTION 134

Which utility will tell you in real time which ports are listening or in another state?

Correct Answer: B

QUESTION 135

Switches maintain a CAM Table that maps individual MAC addresses on the network to physical ports on the switch.
312-50v11 dumps exhibit
In MAC flooding attack, a switch is fed with many Ethernet frames, each containing different source MAC addresses, by the attacker. Switches have a limited memory for mapping various MAC addresses to physical ports. What happens when the CAM table becomes full?

Correct Answer: A