Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :Apr 16, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 451:

    Which of the following is a low-tech way of gaining unauthorized access to systems?

    A. Social Engineering

    B. Eavesdropping

    C. Scanning

    D. Sniffing

  • Question 452:

    Which of the following tactics uses malicious code to redirect users' web traffic?

    A. Spimming

    B. Pharming

    C. Phishing

    D. Spear-phishing

  • Question 453:

    Bobby, an attacker, targeted a user and decided to hijack and intercept all their wireless communications. He installed a fake communication tower between two authentic endpoints to mislead the victim. Bobby used this virtual tower to interrupt the data transmission between the user and real tower, attempting to hijack an active session, upon receiving the users request. Bobby manipulated the traffic with the virtual tower and redirected the victim to a malicious website. What is the attack performed by Bobby in the above scenario?

    A. Wardriving

    B. KRACK attack

    C. jamming signal attack

    D. aLTEr attack

  • Question 454:

    Steven connected his iPhone to a public computer that had been infected by Clark, an attacker. After establishing the connection with the public computer, Steven enabled iTunes WI-FI sync on the computer so that the device could continue

    communication with that computer even after being physically disconnected. Now, Clark gains access to Steven's iPhone through the infected computer and is able to monitor and read all of Steven's activity on the iPhone, even after the

    device is out of the communication zone.

    Which of the following attacks is performed by Clark in above scenario?

    A. IOS trustjacking

    B. lOS Jailbreaking

    C. Exploiting SS7 vulnerability

    D. Man-in-the-disk attack

  • Question 455:

    What is the following command used for? net use \targetipc$ "" /u:""

    A. Grabbing the etc/passwd file

    B. Grabbing the SAM

    C. Connecting to a Linux computer through Samba.

    D. This command is used to connect as a null session

    E. Enumeration of Cisco routers

  • Question 456:

    Within the context of Computer Security, which of the following statements describes Social Engineering best?

    A. Social Engineering is the act of publicly disclosing information

    B. Social Engineering is the means put in place by human resource to perform time accounting

    C. Social Engineering is the act of getting needed information from a person rather than breaking into a system

    D. Social Engineering is a training program within sociology studies

  • Question 457:

    What is the minimum number of network connections in a multi homed firewall?

    A. 3

    B. 5

    C. 4

    D. 2

  • Question 458:

    Tess King is using the nslookup command to craft queries to list all DNS information (such as Name Servers, host names, MX records, CNAME records, glue records (delegation for child Domains), zone serial number, TimeToLive (TTL)

    records, etc) for a Domain.

    What do you think Tess King is trying to accomplish? Select the best answer.

    A. A zone harvesting

    B. A zone transfer

    C. A zone update

    D. A zone estimate

  • Question 459:

    A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer's software and hardware without the owner's permission. Their intention can either be to simply gain knowledge or to illegally make

    changes.

    Which of the following class of hacker refers to an individual who works both offensively and defensively at various times?

    A. White Hat

    B. Suicide Hacker

    C. Gray Hat

    D. Black Hat

  • Question 460:

    On performing a risk assessment, you need to determine the potential impacts when some of the critical business processes of the company interrupt its service. What is the name of the process by which you can determine those critical businesses?

    A. Emergency Plan Response (EPR)

    B. Business Impact Analysis (BIA)

    C. Risk Mitigation

    D. Disaster Recovery Planning (DRP)

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.