312-50v11 Dumps

312-50v11 Free Practice Test

EC-Council 312-50v11: Certified Ethical Hacker Exam (CEH v11)

QUESTION 156

Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?

Correct Answer: B

QUESTION 157

You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist’s email, and you send her an email changing the source email to her boss’s email (boss@company). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with links. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don’t work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network. What testing method did you use?

Correct Answer: A

QUESTION 158

You have gained physical access to a Windows 2008 R2 server which has an accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your toolkit, you have an Ubuntu 9.10 Linux LiveCD. Which Linux-based tool can change any user’s password or activate disabled Windows accounts?

Correct Answer: C

QUESTION 159

A large mobile telephony and data network operator has a data center that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems.
What is the best security policy concerning this setup?

Correct Answer: A

QUESTION 160

What two conditions must a digital signature meet?

Correct Answer: B