EC-Council 312-50v11 Exam
Certified Ethical Hacker Exam (Updated to CEH v12) (Page 19 )

Updated On: 12-Jan-2026

Garry is a network administrator in an organization. He uses SNMP to manage networked devices from a remote location. To manage nodes in the network, he uses MIB. which contains formal descriptions of all network objects managed by SNMP. He accesses the contents of MIB by using a web browser either by entering the IP address and Lseries.mlb or by entering the DNS library name and Lseries.mlb. He is currently retrieving information from an MIB that contains object types for workstations and server services. Which of the following types of MIB is accessed by Garry in the above scenario?

  1. LNMIB2.MIB
  2. WINS.MIB
  3. DHCP.MIS
  4. MIB_II.MIB

Answer(s): A

Explanation:

DHCP.MIB: Monitors network traffic between DHCP servers and remote hosts
■ HOSTMIB.MIB: Monitors and manages host resources
■ LNMIB2.MIB: Contains object types for workstation and server services
■ MIBJI.MIB: Manages TCP/IP-based Internet using a simple architecture and system
■ WINS.MIB: For the Windows Internet Name Service (WINS)



A friend of yours tells you that he downloaded and executed a file that was sent to him by a coworker. Since the file did nothing when executed, he asks you for help because he suspects that he may have installed a trojan on his computer.
What tests would you perform to determine whether his computer Is Infected?

  1. Use ExifTool and check for malicious content.
  2. You do not check; rather, you immediately restore a previous snapshot of the operating system.
  3. Upload the file to VirusTotal.
  4. Use netstat and check for outgoing connections to strange IP addresses or domains.

Answer(s): C



What is the file that determines the basic configuration (specifically activities, services, broadcast receivers, etc.) in an Android application?

  1. AndroidManifest.xml
  2. APK.info
  3. resources.asrc
  4. classes.dex

Answer(s): A

Explanation:

The AndroidManifest.xml file contains information of your package, including components of the appliance like activities, services, broadcast receivers, content providers etc. It performs another tasks also:
• It’s responsible to guard the appliance to access any protected parts by providing the permissions.
• It also declares the android api that the appliance goes to use.
• It lists the instrumentation classes. The instrumentation classes provides profiling and other informations. These informations are removed just before the appliance is published etc. This is the specified xml file for all the android application and located inside the basis directory.



In the Common Vulnerability Scoring System (CVSS) v3.1 severity ratings, what range does medium vulnerability fall in?

  1. 3.0-6.9
  2. 40-6.0
  3. 4.0-6.9
  4. 3.9-6.9

Answer(s): C



Bobby, an attacker, targeted a user and decided to hijack and intercept all their wireless communications. He installed a fake communication tower between two authentic endpoints to mislead the victim. Bobby used this virtual tower to interrupt the data transmission between the user and real tower, attempting to hijack an active session, upon receiving the users request. Bobby manipulated the traffic with the virtual tower and redirected the victim to a malicious website. What is the attack performed by Bobby in the above scenario?

  1. Wardriving
  2. KRACK attack
  3. jamming signal attack
  4. aLTEr attack

Answer(s): D



Viewing page 19 of 102
Viewing questions 91 - 95 out of 528 questions



Post your Comments and Discuss EC-Council 312-50v11 exam prep with other Community members:

Join the 312-50v11 Discussion