Free 312-50v11 Exam Dumps

No Installation Required, Instantly Prepare for the 312-50v11 exam and please click the below link to start the 312-50v11 Exam Simulator with a real 312-50v11 practice exam questions.
Use directly our on-line 312-50v11 exam dumps materials and try our Testing Engine to pass the 312-50v11 which is always updated.

  • Exam Code: 312-50v11
  • Exam Title: Certified Ethical Hacker Exam (CEH v11)
  • Vendor: EC-Council
  • Exam Questions: 522
  • Last Updated: December 18th,2024

Question 1

Every company needs a formal written document which spells out to employees precisely what they are allowed to use the company's systems for, what is prohibited, and what will happen to them if they break the rules. Two printed copies of the policy should be given to every employee as soon as possible after they join the organization. The employee should be asked to sign one copy, which should be safely filed by the company. No one should be allowed to use the company's computer systems until they have signed the policy in acceptance of its terms.
What is this document called?

Correct Answer:B

Question 2

You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist’s email, and you send her an email changing the source email to her boss’s email (boss@company). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with links. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don’t work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network. What testing method did you use?

Correct Answer:A

Question 3

Peter extracts the SIDs list from Windows 2000 Server machine using the hacking tool "SIDExtractor". Here is the output of the SIDs:
312-50v11 dumps exhibit
From the above list identify the user account with System Administrator privileges.

Correct Answer:F

Question 4

Study the snort rule given below:
312-50v11 dumps exhibit
From the options below, choose the exploit against which this rule applies.

Correct Answer:C

Question 5

When you are getting information about a web server, it is very important to know the HTTP Methods (GET, POST, HEAD, PUT, DELETE, TRACE) that are available because there are two critical methods (PUT and DELETE). PUT can upload a file to the server and DELETE can delete a file from the server. You can detect all these methods (GET, POST, HEAD, DELETE, PUT, TRACE) using NMAP script engine. What Nmap script will help you with this task?

Correct Answer:A