100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Certified Ethical Hacker Exam (CEH v11) September 2021 $10.49   Add to cart

Exam (elaborations)

Certified Ethical Hacker Exam (CEH v11) September 2021

 23 views  0 purchase
  • Course
  • Institution

QUESTION 946 Geena, a cloud architect, uses a master component in the Kubernetes cluster architecture that scans newly generated pods and allocates a node to them. This component can also assign nodes based on factors such as the overall resource requirement, data locality, software/hardware/po...

[Show more]

Preview 2 out of 8  pages

  • March 21, 2022
  • 8
  • 2021/2022
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Braindump2go Guarantee All Exams 100% Pass
One Time!
 Vendor: EC-Council


 Exam Code: 312-50v11


 Exam Name: Certified Ethical Hacker Exam (CEH v11)


 New Updated Questions from Braindump2go

 (Updated in September/2021)


Visit Braindump2go and Download Full Version 312-50v11 Exam Dumps

QUESTION 946
Geena, a cloud architect, uses a master component in the Kubernetes cluster architecture that scans newly generated
pods and allocates a node to them.
This component can also assign nodes based on factors such as the overall resource requirement, data locality,
software/hardware/policy restrictions, and internal workload interventions.
Which of the following master components is explained in the above scenario?

A. Kube-controller-manager
B. Kube-scheduler
C. Kube-apiserver
D. Etcd cluster

Answer: B

QUESTION 947
_________ is a type of phishing that targets high-profile executives such as CEOs, CFOs, politicians, and celebrities
who have access to confidential and highly valuable information.

A. Spear phishing
B. Whaling
C. Vishing
D. Phishing

Answer: B

QUESTION 948
Peter, a system administrator working at a reputed IT firm, decided to work from his home and login remotely. Later, he
anticipated that the remote connection could be exposed to session hijacking. To curb this possibility, he implemented
a technique that creates a safe and encrypted tunnel over a public network to securely send and receive sensitive
information and prevent hackers from decrypting the data flow between the endpoints. What is the technique followed
by Peter to send files securely through a remote connection?

A. DMZ
B. SMB signing
C. VPN
D. Switch network

Answer: C

QUESTION 949
An attacker can employ many methods to perform social engineering against unsuspecting employees, including
312-50v11 Exam Dumps 312-50v11 Exam Questions 312-50v11 PDF Dumps 312-50v11 VCE Dumps

https://www.braindump2go.com/312-50v11.html
This study source was downloaded by 100000840304359 from CourseHero.com on 03-21-2022 08:34:58 GMT -05:00


https://www.coursehero.com/file/123102690/September-2021New-Braindump2go-312-50v11-PDF-and-312-50v11-VCE-Dumps946-978pdf/

, Braindump2go Guarantee All Exams 100% Pass One Time!

scareware.
What is the best example of a scareware attack?

A. A pop-up appears to a user stating, "You have won a free cruise! Click here to claim your prize!"
B. A banner appears to a user stating, "Your account has been locked. Click here to reset your
password and unlock your account."
C. A banner appears to a user stating, "Your Amazon order has been delayed. Click here to find out
your new delivery date."
D. A pop-up appears to a user stating, "Your computer may have been infected with spyware. Click
here to install an anti-spyware tool to resolve this issue."

Answer: D

QUESTION 950
Bill has been hired as a penetration tester and cyber security auditor for a major credit card company. Which
information security standard is most applicable to his role?

A. FISMA
B. HITECH
C. PCI-DSS
D. Sarbanes-OxleyAct

Answer: C

QUESTION 951
Tony wants to integrate a 128-bit symmetric block cipher with key sizes of 128,192, or 256 bits into a software program,
which involves 32 rounds of computational operations that include substitution and permutation operations on four 32-
bit word blocks using 8-variable S-boxes with 4-bit entry and 4-bit exit. Which of the following algorithms includes all the
above features and can be integrated by Tony into the software program?

A. TEA
B. CAST-128
C. RC5
D. serpent

Answer: D

QUESTION 952
Morris, an attacker, wanted to check whether the target AP is in a locked state. He attempted using different utilities to
identify WPS-enabled APs in the target wireless network. Ultimately, he succeeded with one special command-line
utility. Which of the following command-line utilities allowed Morris to discover the WPS-enabled APs?

A. wash
B. ntptrace
C. macof
D. net View

Answer: A

QUESTION 953
What type of virus is most likely to remain undetected by antivirus software?

A. Cavity virus
B. Stealth virus
C. File-extension virus
D. Macro virus
312-50v11 Exam Dumps 312-50v11 Exam Questions 312-50v11 PDF Dumps 312-50v11 VCE Dumps

https://www.braindump2go.com/312-50v11.html
This study source was downloaded by 100000840304359 from CourseHero.com on 03-21-2022 08:34:58 GMT -05:00


https://www.coursehero.com/file/123102690/September-2021New-Braindump2go-312-50v11-PDF-and-312-50v11-VCE-Dumps946-978pdf/

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller TopGradess. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

81503 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.49
  • (0)
  Add to cart