Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :Apr 16, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 101:

    You have retrieved the raw hash values from a Windows 2000 Domain Controller. Using social engineering, you come to know that they are enforcing strong passwords. You understand that all users are required to use passwords that are at least 8 characters in length. All passwords must also use 3 of the 4 following categories: lower case letters, capital letters, numbers and special characters. With your existing knowledge of users, likely user account names and the possibility that they will choose the easiest passwords possible, what would be the fastest type of password cracking attack you can run against these hash values and still get results?

    A. Online Attack

    B. Dictionary Attack

    C. Brute Force Attack

    D. Hybrid Attack

  • Question 102:

    DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which security feature on switchers leverages the DHCP snooping database to help prevent man- in-the-middle attacks?

    A. Spanning tree

    B. Dynamic ARP Inspection (DAI)

    C. Port security

    D. Layer 2 Attack Prevention Protocol (LAPP)

  • Question 103:

    You are tasked to configure the DHCP server to lease the last 100 usable IP addresses in subnet to. 1.4.0/23. Which of the following IP addresses could be teased as a result of the new configuration?

    A. 210.1.55.200

    B. 10.1.4.254

    C. 10.1.5.200

    D. 10.1.4.156

  • Question 104:

    You are working as a Security Analyst in a company XYZ that owns the whole subnet range of 23.0.0.0/8 and 192.168.0.0/8. While monitoring the data, you find a high number of outbound connections. You see that IP's owned by XYZ

    (Internal) and private IP's are communicating to a Single Public IP. Therefore, the Internal IP's are sending data to the Public IP. After further analysis, you find out that this Public IP is a blacklisted IP, and the internal communicating devices

    are compromised.

    What kind of attack does the above scenario depict?

    A. Botnet Attack

    B. Spear Phishing Attack

    C. Advanced Persistent Threats

    D. Rootkit Attack

  • Question 105:

    Robin, an attacker, is attempting to bypass the firewalls of an organization through the DNS tunneling method in order to exfiltrate data. He is using the NSTX tool for bypassing the firewalls. On which of the following ports should Robin run the NSTX tool?

    A. Port 53

    B. Port 23

    C. Port 50

    D. Port 80

  • Question 106:

    Susan has attached to her company's network. She has managed to synchronize her boss's sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on

    the server in his home directory.

    What kind of attack is Susan carrying on?

    A. A sniffing attack

    B. A spoofing attack

    C. A man in the middle attack

    D. A denial of service attack

  • Question 107:

    Steve, an attacker, created a fake profile on a social media website and sent a request to Stella. Stella was enthralled by Steve's profile picture and the description given for his profile, and she initiated a conversation with him soon after accepting the request. After a few days. Sieve started asking about her company details and eventually gathered all the essential information regarding her company. What is the social engineering technique Steve employed in the above scenario?

    A. Diversion theft

    B. Baiting

    C. Honey trap

    D. Piggybacking

  • Question 108:

    Henry is a cyber security specialist hired by BlackEye - Cyber security solutions. He was tasked with discovering the operating system (OS) of a host. He used the Unkornscan tool to discover the OS of the target system. As a result, he obtained a TTL value, which indicates that the target system is running a Windows OS. Identify the TTL value Henry obtained, which indicates that the target OS is Windows.

    A. 64

    B. 128

    C. 255

    D. 138

  • Question 109:

    A user on your Windows 2000 network has discovered that he can use L0phtcrack to sniff the SMB exchanges which carry user logons. The user is plugged into a hub with 23 other systems.

    However, he is unable to capture any logons though he knows that other users are logging in.

    What do you think is the most likely reason behind this?

    A. There is a NIDS present on that segment.

    B. Kerberos is preventing it.

    C. Windows logons cannot be sniffed.

    D. L0phtcrack only sniffs logons to web servers.

  • Question 110:

    Robert, a professional hacker, is attempting to execute a fault injection attack on a target IoT device. In this process, he injects faults into the power supply that can be used for remote execution, also causing the skipping of key instructions.

    He also injects faults into the clock network used for delivering a synchronized signal across the chip.

    Which of the following types of fault injection attack is performed by Robert in the above scenario?

    A. Frequency/voltage tampering

    B. Optical, electromagnetic fault injection (EMFI)

    C. Temperature attack

    D. Power/clock/reset glitching

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.