Free 312-50v11 Exam Braindumps (page: 3)

Page 3 of 127

Which of the following is the best countermeasure to encrypting ransomwares?

  1. Use multiple antivirus softwares
  2. Pay a ransom
  3. Keep some generation of off-line backup
  4. Analyze the ransomware to get decryption key of encrypted data

Answer(s): C



Session splicing is an IDS evasion technique in which an attacker delivers data in multiple, small sized packets to the target computer, making it very difficult for an IDS to detect the attack signatures. Which tool can be used to perform session splicing attacks?

  1. tcpsplice
  2. Burp
  3. Hydra
  4. Whisker

Answer(s): D



You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly.
What is the best Nmap command you will use?

  1. nmap -T4 -q 10.10.0.0/24
  2. nmap -T4 -F 10.10.0.0/24
  3. nmap -T4 -r 10.10.1.0/24
  4. nmap -T4 -O 10.10.0.0/24

Answer(s): B



As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing.
What document describes the specifics of the testing, the associated violations, and essentially protects both the organization’s interest and your liabilities as a tester?

  1. Service Level Agreement
  2. Project Scope
  3. Rules of Engagement
  4. Non-Disclosure Agreement

Answer(s): C






Post your Comments and Discuss EC-Council 312-50v11 exam with other Community members:

312-50v11 Exam Discussions & Posts