Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :Apr 16, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 431:

    A network administrator discovers several unknown files in the root directory of his Linux FTP server. One of the files is a tarball, two are shell script files, and the third is a binary file is named "nc." The FTP server's access logs show that the

    anonymous user account logged in to the server, uploaded the files, and extracted the contents of the tarball and ran the script using a function provided by the FTP server's software. The "ps" command shows that the "nc" file is running as

    process, and the netstat command shows the "nc" process is listening on a network port.

    What kind of vulnerability must be present to make this remote attack possible?

    A. File system permissions

    B. Privilege escalation

    C. Directory traversal

    D. Brute force login

  • Question 432:

    A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0/24. Which of the following has occurred?

    A. The computer is not using a private IP address.

    B. The gateway is not routing to a public IP address.

    C. The gateway and the computer are not on the same network.

    D. The computer is using an invalid IP address.

  • Question 433:

    Infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?

    A. Reconnaissance

    B. Maintaining access

    C. Scanning

    D. Gaining access

  • Question 434:

    In this form of encryption algorithm, every individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?

    A. IDEA

    B. Triple Data Encryption standard

    C. MDS encryption algorithm

    D. AES

  • Question 435:

    Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access.

    A camera captures people walking and identifies the individuals using Steve's approach.

    After that, people must approximate their RFID badges. Both the identifications are required to open the door. In this case, we can say:

    A. Although the approach has two phases, it actually implements just one authentication factor

    B. The solution implements the two authentication factors: physical object and physical characteristic

    C. The solution will have a high level of false positives

    D. Biological motion cannot be used to identify people

  • Question 436:

    This TCP flag instructs the sending system to transmit all buffered data immediately.

    A. SYN

    B. RST

    C. PSH

    D. URG

    E. FIN

  • Question 437:

    Firewalls are the software or hardware systems that are able to control and monitor the traffic coming in and out the target network based on pre-defined set of rules. Which of the following types of firewalls can protect against SQL injection attacks?

    A. Data-driven firewall

    B. Packet firewall

    C. Web application firewall

    D. Stateful firewall

  • Question 438:

    During the process of encryption and decryption, what keys are shared?

    A. Private keys

    B. User passwords

    C. Public keys

    D. Public and private keys

  • Question 439:

    If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which other option could the tester use to get a response from a host using TCP?

    A. Traceroute

    B. Hping

    C. TCP ping

    D. Broadcast ping

  • Question 440:

    John, a professional hacker, decided to use DNS to perform data exfiltration on a target network. In this process, he embedded malicious data into the DNS protocol packets that even DNSSEC could not detect. Using this technique, John successfully injected malware to bypass a firewall and maintained communication between the victim machine and the CandC server. What is the technique employed by John to bypass the firewall?

    A. DNS cache snooping

    B. DNSSEC zone walking

    C. DNS tunneling method

    D. DNS enumeration

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.