Free 312-50v11 Exam Braindumps

Pass your Certified Ethical Hacker Exam (CEH v11) exam with these free Questions and Answers

Page 7 of 106
QUESTION 26

What would be the fastest way to perform content enumeration on a given web server by using the Gobuster tool?

  1. A. Performing content enumeration using the bruteforce mode and 10 threads
  2. B. Shipping SSL certificate verification
  3. C. Performing content enumeration using a wordlist
  4. D. Performing content enumeration using the bruteforce mode and random file extensions

Correct Answer: A

QUESTION 27

While performing an Nmap scan against a host, Paola determines the existence of a firewall. In an attempt to determine whether the firewall is stateful or stateless, which of the following options would be best to use?

  1. A. -sA
  2. B. -sX
  3. C. -sT
  4. D. -sF

Correct Answer: A

QUESTION 28

CompanyXYZ has asked you to assess the security of their perimeter email gateway. From your office in New York, you craft a specially formatted email message and send it across the Internet to an employee of CompanyXYZ. The employee of CompanyXYZ is aware of your test. Your email message looks like this:
From: jim_miller@companyxyz.com
To: michelle_saunders@companyxyz.com Subject: Test message Date: 4/3/2017 14:37
The employee of CompanyXYZ receives your email message.
This proves that CompanyXYZ’s email gateway doesn’t prevent what?

  1. A. Email Masquerading
  2. B. Email Harvesting
  3. C. Email Phishing
  4. D. Email Spoofing

Correct Answer: D

QUESTION 29

An attacker is trying to redirect the traffic of a small office. That office is using their own mail server, DNS server and NTP server because of the importance of their job. The attacker gain access to the DNS server and redirect the direction www.google.com to his own IP address. Now when the employees of the office want to go to Google they are being redirected to the attacker machine. What is the name of this kind of attack?

  1. A. MAC Flooding
  2. B. Smurf Attack
  3. C. DNS spoofing
  4. D. ARP Poisoning

Correct Answer: C

QUESTION 30

The company ABC recently contracts a new accountant. The accountant will be working with the financial statements. Those financial statements need to be approved by the CFO and then they will be sent to the accountant but the CFO is worried because he wants to be sure that the information sent to the accountant was not modified once he approved it. Which of the following options can be useful to ensure the integrity of the data?

  1. A. The CFO can use a hash algorithm in the document once he approved the financial statements
  2. B. The CFO can use an excel file with a password
  3. C. The financial statements can be sent twice, one by email and the other delivered in USB and the accountant can compare both to be sure is the same document
  4. D. The document can be sent to the accountant using an exclusive USB for that document

Correct Answer: A

Page 7 of 106

Post your Comments and Discuss EC-Council 312-50v11 exam with other Community members: