Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :Apr 16, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 461:

    How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?

    A. There is no way to tell because a hash cannot be reversed

    B. The right most portion of the hash is always the same

    C. The hash always starts with AB923D

    D. The left most portion of the hash is always the same

    E. A portion of the hash will be all 0's

  • Question 462:

    Which of the following tools can be used to perform a zone transfer?

    A. NSLookup

    B. Finger

    C. Dig

    D. Sam Spade

    E. Host

    F. Netcat

    G. Neotrace

  • Question 463:

    Which of the following Bluetooth hacking techniques refers to the theft of information from a wireless device through Bluetooth?

    A. Bluesmacking

    B. Bluebugging

    C. Bluejacking

    D. Bluesnarfing

  • Question 464:

    Every company needs a formal written document which spells out to employees precisely what they are allowed to use the company's systems for, what is prohibited, and what will happen to them if they break the rules. Two printed copies of

    the policy should be given to every employee as soon as possible after they join the organization. The employee should be asked to sign one copy, which should be safely filed by the company. No one should be allowed to use the company's

    computer systems until they have signed the policy in acceptance of its terms.

    What is this document called?

    A. Information Audit Policy (IAP)

    B. Information Security Policy (ISP)

    C. Penetration Testing Policy (PTP)

    D. Company Compliance Policy (CCP)

  • Question 465:

    An attacker is trying to redirect the traffic of a small office. That office is using their own mail server, DNS server and NTP server because of the importance of their job. The attacker gain access to the DNS server and redirect the direction www.google.com to his own IP address. Now when the employees of the office want to go to Google they are being redirected to the attacker machine. What is the name of this kind of attack?

    A. MAC Flooding

    B. Smurf Attack

    C. DNS spoofing

    D. ARP Poisoning

  • Question 466:

    Which Nmap switch helps evade IDS or firewalls?

    A. -n/-R

    B. -0N/-0X/-0G

    C. -T

    D. -D

  • Question 467:

    Bob was recently hired by a medical company after it experienced a major cyber security breach. Many patients are complaining that their personal medical records are fully exposed on the Internet and someone can find them with a simple Google search. Bob's boss is very worried because of regulations that protect those data. Which of the following regulations is mostly violated?

    A. HIPPA/PHl

    B. Pll

    C. PCIDSS

    D. ISO 2002

  • Question 468:

    Which method of password cracking takes the most time and effort?

    A. Dictionary attack

    B. Shoulder surfing

    C. Rainbow tables

    D. Brute force

  • Question 469:

    Jake, a professional hacker, installed spyware on a target iPhone to spy on the target user's activities. He can take complete control of the target mobile device by jailbreaking the device remotely and record audio, capture screenshots, and monitor all phone calls and SMS messages. What is the type of spyware that Jake used to infect the target device?

    A. DroidSheep

    B. Androrat

    C. Zscaler

    D. Trident

  • Question 470:

    Johnson, an attacker, performed online research for the contact details of reputed cybersecurity firms. He found the contact number of sibertech.org and dialed the number, claiming himself to represent a technical support team from a

    vendor. He warned that a specific server is about to be compromised and requested sibertech.org to follow the provided instructions. Consequently, he prompted the victim to execute unusual commands and install malicious files, which were

    then used to collect and pass critical Information to Johnson's machine.

    What is the social engineering technique Steve employed in the above scenario?

    A. Quid pro quo

    B. Diversion theft

    C. Elicitation

    D. Phishing

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.