Eccouncil 312-50v11 Certified Ethical Hacker V11 Exam Practice Test

Page:    1 / 14   
Total 528 questions

Question 1

Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient's consent, similar to email spamming?



Answer : C

Question 2

Jacob works as a system administrator in an organization. He wants to extract the source code of a mobile application and disassemble the application to analyze its design flaws. Using this technique, he wants to fix any bugs in the application, discover underlying vulnerabilities, and improve defense strategies against attacks.

What is the technique used by Jacob in the above scenario to improve the security of the mobile application?



Answer : A

Question 3

Which rootkit is characterized by its function of adding code and/or replacing some of the operating-system kernel code to obscure a backdoor on a system?



Answer : C

Question 4

Which of the following Metasploit post-exploitation modules can be used to escalate privileges on Windows systems?



Answer : A

Question 5

Robert, a professional hacker, is attempting to execute a fault injection attack on a target IoT device. In this process, he injects faults into the power supply that can be used for remote execution, also causing the skipping of key instructions. He also injects faults into the clock network used for delivering a synchronized signal across the chip.

Which of the following types of fault injection attack is performed by Robert in the above scenario?



Answer : B

Page:    1 / 14   
Total 528 questions