Certified Ethical Hacker Exam (CEH v11) September 2021
23 views 0 purchase
Course
CeCEH v11
Institution
CeCEH V11
QUESTION 946
Geena, a cloud architect, uses a master component in the Kubernetes cluster architecture that scans newly generated
pods and allocates a node to them.
This component can also assign nodes based on factors such as the overall resource requirement, data locality,
software/hardware/po...
Visit Braindump2go and Download Full Version 312-50v11 Exam Dumps
QUESTION 946
Geena, a cloud architect, uses a master component in the Kubernetes cluster architecture that scans newly generated
pods and allocates a node to them.
This component can also assign nodes based on factors such as the overall resource requirement, data locality,
software/hardware/policy restrictions, and internal workload interventions.
Which of the following master components is explained in the above scenario?
A. Kube-controller-manager
B. Kube-scheduler
C. Kube-apiserver
D. Etcd cluster
Answer: B
QUESTION 947
_________ is a type of phishing that targets high-profile executives such as CEOs, CFOs, politicians, and celebrities
who have access to confidential and highly valuable information.
A. Spear phishing
B. Whaling
C. Vishing
D. Phishing
Answer: B
QUESTION 948
Peter, a system administrator working at a reputed IT firm, decided to work from his home and login remotely. Later, he
anticipated that the remote connection could be exposed to session hijacking. To curb this possibility, he implemented
a technique that creates a safe and encrypted tunnel over a public network to securely send and receive sensitive
information and prevent hackers from decrypting the data flow between the endpoints. What is the technique followed
by Peter to send files securely through a remote connection?
A. DMZ
B. SMB signing
C. VPN
D. Switch network
Answer: C
QUESTION 949
An attacker can employ many methods to perform social engineering against unsuspecting employees, including
312-50v11 Exam Dumps 312-50v11 Exam Questions 312-50v11 PDF Dumps 312-50v11 VCE Dumps
https://www.braindump2go.com/312-50v11.html
This study source was downloaded by 100000840304359 from CourseHero.com on 03-21-2022 08:34:58 GMT -05:00
, Braindump2go Guarantee All Exams 100% Pass One Time!
scareware.
What is the best example of a scareware attack?
A. A pop-up appears to a user stating, "You have won a free cruise! Click here to claim your prize!"
B. A banner appears to a user stating, "Your account has been locked. Click here to reset your
password and unlock your account."
C. A banner appears to a user stating, "Your Amazon order has been delayed. Click here to find out
your new delivery date."
D. A pop-up appears to a user stating, "Your computer may have been infected with spyware. Click
here to install an anti-spyware tool to resolve this issue."
Answer: D
QUESTION 950
Bill has been hired as a penetration tester and cyber security auditor for a major credit card company. Which
information security standard is most applicable to his role?
A. FISMA
B. HITECH
C. PCI-DSS
D. Sarbanes-OxleyAct
Answer: C
QUESTION 951
Tony wants to integrate a 128-bit symmetric block cipher with key sizes of 128,192, or 256 bits into a software program,
which involves 32 rounds of computational operations that include substitution and permutation operations on four 32-
bit word blocks using 8-variable S-boxes with 4-bit entry and 4-bit exit. Which of the following algorithms includes all the
above features and can be integrated by Tony into the software program?
A. TEA
B. CAST-128
C. RC5
D. serpent
Answer: D
QUESTION 952
Morris, an attacker, wanted to check whether the target AP is in a locked state. He attempted using different utilities to
identify WPS-enabled APs in the target wireless network. Ultimately, he succeeded with one special command-line
utility. Which of the following command-line utilities allowed Morris to discover the WPS-enabled APs?
A. wash
B. ntptrace
C. macof
D. net View
Answer: A
QUESTION 953
What type of virus is most likely to remain undetected by antivirus software?
A. Cavity virus
B. Stealth virus
C. File-extension virus
D. Macro virus
312-50v11 Exam Dumps 312-50v11 Exam Questions 312-50v11 PDF Dumps 312-50v11 VCE Dumps
https://www.braindump2go.com/312-50v11.html
This study source was downloaded by 100000840304359 from CourseHero.com on 03-21-2022 08:34:58 GMT -05:00
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller TopGradess. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.49. You're not tied to anything after your purchase.