Free 312-50v11 Exam Braindumps

Pass your Certified Ethical Hacker Exam (CEH v11) exam with these free Questions and Answers

Page 4 of 106
QUESTION 11

Which of the following is a command line packet analyzer similar to GUI-based Wireshark?

  1. A. nessus
  2. B. tcpdump
  3. C. ethereal
  4. D. jack the ripper

Correct Answer: B

QUESTION 12

A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the IT department had a dial-out modem installed.
Which security policy must the security analyst check to see if dial-out modems are allowed?

  1. A. Firewall-management policy
  2. B. Acceptable-use policy
  3. C. Permissive policy
  4. D. Remote-access policy

Correct Answer: D

QUESTION 13

In an internal security audit, the white hat hacker gains control over a user account and attempts to acquire access to another account's confidential files and information. How can he achieve this?

  1. A. Privilege Escalation
  2. B. Shoulder-Surfing
  3. C. Hacking Active Directory
  4. D. Port Scanning

Correct Answer: A

QUESTION 14

You are logged in as a local admin on a Windows 7 system and you need to launch the Computer Management Console from command line.
Which command would you use?

  1. A. c:\compmgmt.msc
  2. B. c:\services.msc
  3. C. c:\ncpa.cp
  4. D. c:\gpedit

Correct Answer: A
To start the Computer Management Console from command line just type compmgmt.msc
/computer:computername in your run box or at the command line and it should automatically open the Computer Management console.
References:
http://www.waynezim.com/tag/compmgmtmsc/

QUESTION 15

John, a security analyst working for an organization, found a critical vulnerability on the organization's LAN that allows him to view financial and personal information about the rest of the employees. Before reporting the vulnerability, he examines the information shown by the vulnerability for two days without disclosing any information to third parties or other internal employees. He does so out of curiosity about the other employees and may take advantage of this information later. What would John be considered as?

  1. A. Cybercriminal
  2. B. Black hat
  3. C. White hat
  4. D. Gray hat

Correct Answer: D

Page 4 of 106

Post your Comments and Discuss EC-Council 312-50v11 exam with other Community members: