EC-Council Certified Ethical Hacker Exam (Updated to CEH v12) 312-50v11 Exam Questions in PDF

Free EC-Council 312-50v11 Dumps Questions (page: 7)

What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?

  1. Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.
  2. Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.
  3. Symmetric encryption allows the server to security transmit the session keys out-of-band.
  4. Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.

Answer(s): A



The change of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from the last backup to the new hard disk. The recovery person earns $10/hour. Calculate the SLE, ARO, and ALE. Assume the EF = 1(100%). What is the closest approximate cost of this replacement and recovery operation per year?

  1. $1320
  2. $440
  3. $100
  4. $146

Answer(s): D



What is the known plaintext attack used against DES which gives the result that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single key?

  1. Man-in-the-middle attack
  2. Meet-in-the-middle attack
  3. Replay attack
  4. Traffic analysis attack

Answer(s): B



Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access.
A camera captures people walking and identifies the individuals using Steve’s approach.
After that, people must approximate their RFID badges. Both the identifications are required to open the door. In this case, we can say:

  1. Although the approach has two phases, it actually implements just one authentication factor
  2. The solution implements the two authentication factors: physical object and physical characteristic
  3. The solution will have a high level of false positives
  4. Biological motion cannot be used to identify people

Answer(s): B



What is not a PCI compliance recommendation?

  1. Use a firewall between the public network and the payment card data.
  2. Use encryption to protect all transmission of card holder data over any public network.
  3. Rotate employees handling credit card transactions on a yearly basis to different departments.
  4. Limit access to card holder data to as few individuals as possible.

Answer(s): C



Share your comments for EC-Council 312-50v11 exam with other users:

R
Ranjith
8/21/2023 3:39:00 PM

for question #118, the answer is option c. the screen shot is showing the drop down, but the answer is marked incorrectly please update . thanks for sharing such nice questions.

E
Eduardo Ramírez
12/11/2023 9:55:00 PM

the correct answer for the question 29 is d.

D
Dass
11/2/2023 7:43:00 AM

question no 22: correct answers: bc, 1 per session 1 per page 1 per component always

R
Reddy
12/14/2023 2:42:00 AM

these are pretty useful

D
Daisy Delgado
1/9/2023 1:05:00 PM

awesome

A
Atif
6/13/2023 4:09:00 AM

yes please upload

X
Xunil
6/12/2023 3:04:00 PM

great job whoever put this together, for the greater good! thanks!

L
Lakshmi
10/2/2023 5:26:00 AM

just started to view all questions for the exam

R
rani
1/19/2024 11:52:00 AM

helpful material

G
Greg
11/16/2023 6:59:00 AM

hope for the best

H
hi
10/5/2023 4:00:00 AM

will post exam has finished

V
Vmotu
8/24/2023 11:14:00 AM

really correct and good analyze!

H
hicham
5/30/2023 8:57:00 AM

excellent thanks a lot

S
Suman C
7/7/2023 8:13:00 AM

will post once pass the cka exam

R
Ram
11/3/2023 5:10:00 AM

good content

N
Nagendra Pedipina
7/13/2023 2:12:00 AM

q:32 answer has to be option c

T
Tamer Barakat
12/7/2023 5:17:00 PM

nice questions

D
Daryl
8/1/2022 11:33:00 PM

i really like the support team in this website. they are fast in communication and very helpful.

C
Curtis Nakawaki
6/29/2023 9:13:00 PM

a good contemporary exam review

X
x-men
5/23/2023 1:02:00 AM

q23, its an array, isnt it? starts with [ and end with ]. its an array of objects, not object.

A
abuti
7/21/2023 6:24:00 PM

cool very helpfull

K
Krishneel
3/17/2023 10:34:00 AM

i just passed. this exam dumps is the same one from prepaway and examcollection. it has all the real test questions.

R
Regor
12/4/2023 2:01:00 PM

is this a valid prince2 practitioner dumps?

A
asl
9/14/2023 3:59:00 PM

all are relatable questions

S
Siyya
1/19/2024 8:30:00 PM

might help me to prepare for the exam

T
Ted
6/21/2023 11:11:00 PM

just paid and downlaod the 2 exams using the 50% sale discount. so far i was able to download the pdf and the test engine. all looks good.

P
Paul K
11/27/2023 2:28:00 AM

i think it should be a,c. option d goes against the principle of building anything custom unless there are no work arounds available

P
ph
6/16/2023 12:41:00 AM

very legible

S
sephs2001
7/31/2023 10:42:00 PM

is this exam accurate or helpful?

A
ash
7/11/2023 3:00:00 AM

please upload dump, i have exam in 2 days

S
Sneha
8/17/2023 6:29:00 PM

this is useful

S
sachin
12/27/2023 2:45:00 PM

question 232 answer should be perimeter not netowrk layer. wrong answer selected

T
tomAws
7/18/2023 5:05:00 AM

nice questions

R
Rahul
6/11/2023 2:07:00 AM

hi team, could you please provide this dump ?

AI Tutor 👋 I’m here to help!