312-50v11 Dumps

312-50v11 Free Practice Test

EC-Council 312-50v11: Certified Ethical Hacker Exam (CEH v11)

QUESTION 6

Which is the first step followed by Vulnerability Scanners for scanning a network?

Correct Answer: D

QUESTION 7

What is the algorithm used by LM for Windows2000 SAM?

Correct Answer: B

QUESTION 8

A pen tester is configuring a Windows laptop for a test. In setting up Wireshark, what river and library are required to allow the NIC to work in promiscuous mode?

Correct Answer: D

QUESTION 9

This kind of password cracking method uses word lists in combination with numbers and special characters:

Correct Answer: A

QUESTION 10

While scanning with Nmap, Patin found several hosts which have the IP ID of incremental sequences. He then decided to conduct: nmap -Pn -p- -si kiosk.adobe.com www.riaa.com. kiosk.adobe.com is the host with incremental IP ID sequence. What is the purpose of using "-si" with Nmap?

Correct Answer: A