Skip to content

Certified Ethical Hacker v11 Exam

Here you have the best ECCouncil 312-50v11 practice exam questions

  • Preview the first 5 of 400 questions for free
  • These questions were last updated on May 19, 2026
  • This site is not affiliated with or endorsed by ECCouncil.
Question 1 of 400

While performing online banking using a Web browser, a user receives an email that contains a link to an interesting Web site. When the user clicks on the link, another Web browser session starts and displays a video of cats playing a piano. The next business day, the user receives what looks like an email from his bank, indicating that his bank account has been accessed from a foreign country. The email asks the user to call his bank and verify the authorization of a funds transfer that took place. What Web browser-based security vulnerability was exploited to compromise the user?

Answer

Suggested Answer

The suggested answer is C.

The described scenario indicates a Cross-Site Request Forgery (CSRF) attack. CSRF exploits authenticated sessions by tricking a user into making unauthorized requests. In this case, the user was logged into their online banking and clicked on a link that initiated a malicious request, resulting in unauthorized activity on their bank account. This type of attack leverages the user's active session with the trusted site to perform actions without the user's explicit consent.

Community Votes17 votes
CSuggested
76%
A
24%
Question 2 of 400

Which service in a PKI will vouch for the identity of an individual or company?

Answer

Suggested Answer

The suggested answer is D.

In a Public Key Infrastructure (PKI), the Certification Authority (CA) is the service responsible for vouching for the identity of individuals, companies, or entities. The CA issues digital certificates that bind a public key to a specific identity, effectively verifying and vouching for its authenticity. This ensures the trustworthiness of the parties involved in digital communications and transactions.

Community Votes12 votes
DSuggested
100%
Question 3 of 400

Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.

Answer

Suggested Answer

The suggested answer is B.

The correct answer is Cross-Site Scripting (XSS). XSS attacks involve exploiting vulnerabilities in web applications to inject malicious client-side scripts into web pages that other users view. This allows attackers to execute code within the context of a victim's browser, potentially stealing information or performing actions on behalf of the victim without their consent.

Community Votes10 votes
BSuggested
100%
Question 4 of 400

User A is writing a sensitive email message to user B outside the local network. User A has chosen to use PKI to secure his message and ensure only user B can read the sensitive email. At what layer of the OSI layer does the encryption and decryption of the message take place?

Answer

Suggested Answer

The suggested answer is D.

The encryption and decryption of the message take place at the Presentation layer of the OSI model. This layer is responsible for translating data between the application layer and the network format, which includes activities such as data encryption and decryption to ensure secure communication.

Community Votes10 votes
DSuggested
90%
A
10%
Question 5 of 400

A new wireless client is configured to join a 802.11 network. This client uses the same hardware and software as many of the other clients on the network. The client can see the network, but cannot connect. A wireless packet sniffer shows that the Wireless Access Point (WAP) is not responding to the association requests being sent by the wireless client. What is a possible source of this problem?

Answer

Suggested Answer

The suggested answer is A.

A possible source of the problem is that the Wireless Access Point (WAP) does not recognize the client's MAC address. MAC address filtering is a security feature used on many wireless networks to restrict access based on the MAC addresses of devices. If the WAP has MAC address filtering enabled and the client’s MAC address is not on the allowed list, the WAP will ignore the client’s association requests even though the client can see the network.

Community Votes4 votes
ASuggested
100%

395 more questions await

Unlock the full ECCouncil 312-50v11 question bank

5 of 400 completed1%

Choose your plan

One-time payment · No subscription · No hidden fees

Standard

Quick preparation

$25

30 days access

30 day access to all questions
Instant free updates
Highest passing rate in industry
Printable PDF download
No money-back guarantee
Best Value

Premium

Guaranteed success

$60$35

90 days access

PDF

Printable PDF download

New

Save every question as a PDF for offline study or printing.

90 day access to all questions
Instant free updates
Highest passing rate in industry
Pass guaranteed or money back

100% Money-Back Guarantee

Don't pass? Full refund.

4.9/5

Based on 5,108+ reviews

Trusted by thousands of professionals

Join certified professionals who passed their exams with Examice

Examice helped me pass my AWS certification on the first try! The questions were incredibly similar to the real exam. Comments helped me understand answers I was struggling with.
S
Sarah C.
Cloud Engineer
Great results in a short prep time. Passed on my first attempt.
D
David K.
Network Engineer
I needed to pass an exam for work, and this website delivered. The quality for the price is outstanding, and the support is really good. I passed without issues.
M
Michael R.
Security Analyst
Skeptical at first, but impressed. Every question included clear, detailed explanations.
L
Lisa M.
Solutions Architect
The guarantee gave me confidence to invest in the premium package. Turns out I didn't need it. Passed comfortably. The explanations for each answer were incredibly detailed and helped me grasp security concepts that I'd been struggling with for months.
R
Robert H.
Cybersecurity Consultant
Used Examice for my PMP certification. The questions were well structured and covered all exam domains thoroughly.
J
James T.
IT Manager
After failing my first attempt with other study materials, I switched to Examice and passed confidently on my second attempt.
A
Anna W.
Data Engineer
The premium package was worth it. 90 days of access gave me the flexibility to study when it worked for me, without feeling rushed.
E
Emily J.
DevOps Engineer
Straightforward questions that matched the real exam perfectly. Studied for two weeks and passed with a great score.
K
Karen P.
Systems Administrator

Frequently Asked Questions

Everything you need to know. Contact us for more.

Our ECCouncil 312-50v11 questions are based on real exam experiences and are continuously updated to match the current exam format. We maintain a +99% pass rate because our questions closely mirror what you'll see on the actual exam.

With our Premium package, you get a 100% money-back guarantee. If you don't pass your exam after studying with our materials, simply contact us with your exam results and we'll refund your purchase. Terms and conditions apply, read our full refund policy to learn more.

Our question bank is updated regularly based on feedback from recent exam takers. We typically review and update our content every week with reports about new questions or changes to the exam format.

Standard package access cannot be extended. However, Premium package gives you 90 days which is typically more than enough time to prepare thoroughly. If you need additional time, you can purchase a new package at any time.

This is a one-time payment with no recurring charges. Once you purchase, you get full access to all exam questions for the duration of your package (30 days for Standard, 90 days for Premium). No hidden fees or automatic renewals.

Pass on your first try

All 400questions · Detailed explanations · Printable PDF · 90 days access

Money-back guaranteeSecure checkout
$35

one-time payment