312-50v11 Dumps

312-50v11 Free Practice Test

EC-Council 312-50v11: Certified Ethical Hacker Exam (CEH v11)

QUESTION 141

Fingerprinting an Operating System helps a cracker because:

Correct Answer: D

QUESTION 142

If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?

Correct Answer: B

QUESTION 143

A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?

Correct Answer: B

QUESTION 144

An Internet Service Provider (ISP) has a need to authenticate users connecting via analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network.
Which AAA protocol is the most likely able to handle this requirement?

Correct Answer: D

QUESTION 145

Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?

Correct Answer: D