Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :Apr 16, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 111:

    Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the Information, he successfully performed an attack on the target government organization without being traced. Which of the following techniques is described in the above scenario?

    A. Dark web footprinting

    B. VoIP footpnnting

    C. VPN footprinting

    D. website footprinting

  • Question 112:

    This is an attack that takes advantage of a web site vulnerability in which the site displays content that includes un-sanitized user-provided data.

    What is this attack?

    A. Cross-site-scripting attack

    B. SQL Injection

    C. URL Traversal attack

    D. Buffer Overflow attack

  • Question 113:

    Which of the following is assured by the use of a hash?

    A. Authentication

    B. Confidentiality

    C. Availability

    D. Integrity

  • Question 114:

    Attacker Lauren has gained the credentials of an organization's internal server system, and she was often logging in during irregular times to monitor the network activities. The organization was skeptical about the login times and appointed

    security professional Robert to determine the issue. Robert analyzed the compromised device to find incident details such as the type of attack, its severity, target, impact, method of propagation, and vulnerabilities exploited.

    What is the incident handling and response (IHandR) phase, in which Robert has determined these issues?

    A. Preparation

    B. Eradication

    C. Incident recording and assignment

    D. Incident triage

  • Question 115:

    Becky has been hired by a client from Dubai to perform a penetration test against one of their remote offices. Working from her location in Columbus, Ohio, Becky runs her usual reconnaissance scans to obtain basic information about their network. When analyzing the results of her Whois search, Becky notices that the IP was allocated to a location in Le Havre, France. Which regional Internet registry should Becky go to for detailed information?

    A. ARIN

    B. APNIC

    C. RIPE

    D. LACNIC

  • Question 116:

    What is the port to block first in case you are suspicious that an loT device has been compromised?

    A. 22

    B. 443

    C. 48101

    D. 80

  • Question 117:

    Which protocol is used for setting up secure channels between two devices, typically in VPNs?

    A. PEM

    B. ppp

    C. IPSEC

    D. SET

  • Question 118:

    There are multiple cloud deployment options depending on how isolated a customer's resources are from those of other customers. Shared environments share the costs and allow each customer to enjoy lower operations expenses. One solution is for a customer to Join with a group of users or organizations to share a cloud environment. What is this cloud deployment option called?

    A. Hybrid

    B. Community

    C. Public

    D. Private

  • Question 119:

    What port number is used by LDAP protocol?

    A. 110

    B. 389

    C. 464

    D. 445

  • Question 120:

    Jason, an attacker, targeted an organization to perform an attack on its Internet-facing web server with the intention of gaining access to backend servers, which are protected by a firewall. In this process, he used a URL https://xyz.com/ feed.php?url:externaIsile.com/feed/to to obtain a remote feed and altered the URL input to the local host to view all the local resources on the target server. What is the type of attack Jason performed in the above scenario?

    A. website defacement

    B. Server-side request forgery (SSRF) attack

    C. Web server misconfiguration

    D. web cache poisoning attack

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.