EC-Council 312-50v11 Exam (page: 7)
EC-Council Certified Ethical Hacker Exam (Updated to CEH v12)
Updated on: 09-Feb-2026

Viewing Page 7 of 102

What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?

  1. Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.
  2. Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.
  3. Symmetric encryption allows the server to security transmit the session keys out-of-band.
  4. Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.

Answer(s): A



The change of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from the last backup to the new hard disk. The recovery person earns $10/hour. Calculate the SLE, ARO, and ALE. Assume the EF = 1(100%). What is the closest approximate cost of this replacement and recovery operation per year?

  1. $1320
  2. $440
  3. $100
  4. $146

Answer(s): D



What is the known plaintext attack used against DES which gives the result that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single key?

  1. Man-in-the-middle attack
  2. Meet-in-the-middle attack
  3. Replay attack
  4. Traffic analysis attack

Answer(s): B



Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access.
A camera captures people walking and identifies the individuals using Steve’s approach.
After that, people must approximate their RFID badges. Both the identifications are required to open the door. In this case, we can say:

  1. Although the approach has two phases, it actually implements just one authentication factor
  2. The solution implements the two authentication factors: physical object and physical characteristic
  3. The solution will have a high level of false positives
  4. Biological motion cannot be used to identify people

Answer(s): B



What is not a PCI compliance recommendation?

  1. Use a firewall between the public network and the payment card data.
  2. Use encryption to protect all transmission of card holder data over any public network.
  3. Rotate employees handling credit card transactions on a yearly basis to different departments.
  4. Limit access to card holder data to as few individuals as possible.

Answer(s): C



Viewing Page 7 of 102



Share your comments for EC-Council 312-50v11 exam with other users:

vel 8/28/2023 9:17:09 AM

good one with explanation
Anonymous


Gurdeep 1/18/2024 4:00:15 PM

This is one of the most useful study guides I have ever used.
CANADA