Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :Jan 24, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 1:

    An ethical hacker is scanning a target network. They initiate a TCP connection by sending an SYN packet to a target machine and receiving a SYN/ACK packet in response. But instead of completing the three-way handshake with an ACK

    packet, they send an RST packet.

    What kind of scan is the ethical hacker likely performing and what is their goal?

    A. They are performing an SYN scan to stealthily identify open ports without fully establishing a connection

    B. They are performing a TCP connect scan to identify open ports on the target machine

    C. They are performing a vulnerability scan to identify any weaknesses in the target system

    D. They are performing a network scan to identify live hosts and their IP addresses

  • Question 2:

    An organization has been experiencing intrusion attempts despite deploying an Intrusion Detection System (IDS) and Firewalls. As a Certified Ethical Hacker, you are asked to reinforce the intrusion detection process and recommend a better rule-based approach. The IDS uses Snort rules and the new recommended tool should be able to complement it. You suggest using YARA rules with an additional tool for rule generation. Which of the following tools would be the best choice for this purpose and why?

    A. AutoYara - Because it automates the generation of YARA rules from a set of malicious and benign files

    B. yarGen - Because it generates YARA rules from strings identified in malware files while removing strings that also appear in goodware files

    C. YaraRET - Because it helps in reverse engineering Trojans to generate YARA rules

    D. koodous - Because it combines social networking with antivirus signatures and YARA rules to detect malware

  • Question 3:

    A penetration tester was assigned to scan a large network range to find live hosts. The network is known for using strict TCP filtering rules on its firewall, which may obstruct common host discovery techniques. The tester needs a method that can bypass these firewall restrictions and accurately identify live systems. What host discovery technique should the tester use?

    A. UDP Ping Scan

    B. lCMP ECHO Ping Scan

    C. ICMP Timestamp Ping Scan

    D. TCP SYN Ping Scan

  • Question 4:

    In the process of footprinting a target website, an ethical hacker utilized various tools to gather critical information. The hacker encountered a target site where standard web spiders were ineffective due to a specific file in its root directory. However, they managed to uncover all the files and web pages on the target site, monitoring the resulting incoming and outgoing traffic while browsing the website manually. What technique did the hacker likely employ to achieve this?

    A. Using Photon to retrieve archived URLs of the target website from archive.org

    B. Using the Netcraft tool to gather website information

    C. Examining HTML source code and cookies

    D. User-directed spidering with tools like Burp Suite and WebScarab

  • Question 5:

    During an attempt to perform an SQL injection attack, a certified ethical hacker is focusing on the identification of database engine type by generating an ODBC error. The ethical hacker, after injecting various payloads, finds that the web application returns a standard, generic error message that does not reveal any detailed database information. Which of the following techniques would the hacker consider next to obtain useful information about the underlying database?

    A. Use the UNION operator to combine the result sets of two or more SELECT statements

    B. Attempt to compromise the system through OS-level command shell execution

    C. Try to insert a string value where a number is expected in the input field

    D. Utilize a blind injection technique that uses time delays or error signatures to extract information

  • Question 6:

    An ethical hacker has been tasked with assessing the security of a major corporation's network. She suspects the network uses default SNMP community strings. To exploit this, she plans to extract valuable network information using SNMP enumeration. Which tool could best help her to get the information without directly modifying any parameters within the SNMP agent's management information base (MIB)?

    A. snmp-check (snmp_enum Module) to gather a wide array of information about the target

    B. Nmap, with a script to retrieve all running SNMP processes and associated ports

    C. Oputits, are mainly designed for device management and not SNMP enumeration

    D. SnmpWalk, with a command to change an OID to a different value

  • Question 7:

    As an IT Security Analyst, you've been asked to review the security measures of an e-commerce website that relies on a SQL database for storing sensitive customer data. Recently, an anonymous tip has alerted you to a possible threat: a seasoned hacker who specializes in SQL Injection attacks may be targeting your system. The site already employs input validation measures to prevent basic injection attacks, and it blocks any user inputs containing suspicious patterns. However, this hacker is known to use advanced SQL Injection techniques. Given this situation, which of the following strategies would the hacker most likely adopt to bypass your security measures?

    A. The hacker could deploy an 'out-of-band' SQL Injection attack, extracting data via a different communication channel, such as DNS or HTTP requests

    B. The hacker may resort to a DDoS attack instead, attempting to crash the server and thus render the e commerce site unavailable

    C. The hacker may try to use SQL commands which are less known and less likely to be blocked by your system's security

    D. The hacker might employ a blind' SQL Injection attack, taking advantage of the application's true or false responses to extract data bit by bit

  • Question 8:

    As a cybersecurity consultant for SafePath Corp, you have been tasked with implementing a system for secure email communication. The key requirement is to ensure both confidentiality and non-repudiation. While considering various encryption methods, you are inclined towards using a combination of symmetric and asymmetric cryptography. However, you are unsure which cryptographic technique would best serve the purpose. Which of the following options would you choose to meet these requirements?

    A. Use symmetric encryption with the AES algorithm.

    B. Use the Diffie-Hellman protocol for key exchange and encryption.

    C. Apply asymmetric encryption with RSA and use the public key for encryption.

    D. Apply asymmetric encryption with RSA and use the private key for signing.

  • Question 9:

    In your cybersecurity class, you are learning about common security risks associated with web servers. One topic that comes up is the risk posed by using default server settings. Why is using default settings on a web server considered a security risk, and what would be the best initial step to mitigate this risk?

    A. Default settings cause server malfunctions; simplify the settings

    B. Default settings allow unlimited login attempts; setup account lockout

    C. Default settings reveal server software type; change these settings

    D. Default settings enable auto-updates; disable and manually patch

  • Question 10:

    You have been hired as an intern at a start-up company. Your first task is to help set up a basic web server for the company's new website. The team leader has asked you to make sure the server is secure from common - threats. Based on your knowledge from studying for the CEH exam, which of the following actions should be your priority to secure the web server?

    A. Installing a web application firewall

    B. limiting the number of concurrent connections to the server

    C. Encrypting the company's website with SSL/TLS

    D. Regularly updating and patching the server software

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.