ECCouncil 312-50v11 - Certified Ethical Hacker v11 Exam Exam

Question #6 (Topic: Single Topic)
If you want to only scan fewer ports than the default scan using Nmap tool, which option would you use?
A. -r B. -F C. -P D. -sP
Answer: B
Question #7 (Topic: Single Topic)
Which of the following is the structure designed to verify and authenticate the identity of individuals within the enterprise taking part in a data exchange?
A. SOA B. biometrics C. single sign on D. PKI
Answer: D
Question #8 (Topic: Single Topic)
You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist's
email, and you send her an email changing the source email to her boss's email (boss@company). In this email, you ask for a pdf with information. She reads
your email and sends back a pdf with links. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf,
saying that the links don't work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network. What
testing method did you use?
A. Social engineering B. Piggybacking C. Tailgating D. Eavesdropping
Answer: A
Question #9 (Topic: Single Topic)
If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and
the network may be using TCP. Which other option could the tester use to get a response from a host using TCP?
A. Traceroute B. Hping C. TCP ping D. Broadcast ping
Answer: B
Question #10 (Topic: Single Topic)
Which is the first step followed by Vulnerability Scanners for scanning a network?
A. OS Detection B. Firewall detection C. TCP/UDP Port scanning D. Checking if the remote host is alive
Answer: D
Download Exam
Page: 2 / 80
Total 400 questions