Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :Apr 08, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 41:

    A skilled ethical hacker was assigned to perform a thorough OS discovery on a potential target. They decided to adopt an advanced fingerprinting technique and sent a TCP packet to an open TCP port with specific flags enabled. Upon receiving the reply, they noticed the flags were SYN and ECN-Echo. Which test did the ethical hacker conduct and why was this specific approach adopted?

    A. Test 3: The test was executed to observe the response of the target system when a packet with URG, PSH, SYN, and FIN flags was sent, thereby identifying the OS

    B. Qrest 1: The test was conducted because SYN and ECN-Echo flags enabled to allow the hacker to probe the nature of the response and subsequently determine the OS fingerprint

    C. Test 2: This test was chosen because a TCP packet with no flags enabled is known as a NULL packet and this would allow the hacker to assess the OS of the target

    D. Test 6: The hacker selected this test because a TCP packet with the ACK flag enabled sent to a closed TCP port would yield more information about the OS

  • Question 42:

    You are the chief cybersecurity officer at CloudSecure Inc., and your team is responsible for securing a cloudbased application that handles sensitive customer data. To ensure that the data is protected from breaches, you have decided to implement encryption for both data-at-rest and data-in-transit. The development team suggests using SSL/TLS for securing data in transit. However, you want to also implement a mechanism to detect if the data was tampered with during transmission. Which of the following should you propose?

    A. Implement IPsec in addition to SSL/TLS.

    B. Qswitch to using SSH for data transmission.

    C. Use the cloud service provider's built-in encryption services.

    D. Encrypt data using the AES algorithm before transmission.

  • Question 43:

    A well-resourced attacker intends to launch a highly disruptive DDoS attack against a major online retailer. The attacker aims to exhaust all the network resources while keeping their identity concealed. Their method should be resistant to simple defensive measures such as IP-based blocking. Based on these objectives, which of the following attack strategies would be most effective?

    A. The attacker should instigate a protocol-based SYN flood attack, consuming connection state tables on the retailer's servers

    B. The attacker should execute a simple ICMP flood attack from a single IP, exploiting the retailer's ICMP processing

    C. The attacker should leverage a botnet to launch a Pulse Wave attack, sending high- volume traffic pulses at regular intervals

    D. The attacker should initiate a volumetric flood attack using a single compromised machine to overwhelm the retailer's network bandwidth

  • Question 44:

    A cybersecurity analyst in an organization is using the Common Vulnerability Scoring System to assess and prioritize identified vulnerabilities in their IT infrastructure. They encountered a vulnerability with a base metric score of 7, a temporal metric score of 8, and an environmental metric score of 5. Which statement best describes this scenario?

    A. The vulnerability has a medium severity with a high likelihood of exploitability over time and a considerable impact in their specific environment

    B. The vulnerability has a medium severity with a diminishing likelihood of exploitability over time, but a significant impact in their specific environment

    C. The vulnerability has an overall high severity with a diminishing likelihood of exploitability over time, but it is less impactful in their specific environment

    D. The vulnerability has an overall high severity, the likelihood of exploitability is increasing over time, and it has a medium impact in their specific environment

  • Question 45:

    You are the chief security officer at AlphaTech, a tech company that specializes in data storage solutions. Your company is developing a new cloud storage platform where users can store their personal files. To ensure data security, the development team is proposing to use symmetric encryption for data at rest. However, they are unsure of how to securely manage and distribute the symmetric keys to users. Which of the following strategies would you recommend to them?

    A. Use hash functions to distribute the keys.

    B. implement the Diffie-Hellman protocol for secure key exchange.

    C. Use HTTPS protocol for secure key transfer.

    D. Use digital signatures to encrypt the symmetric keys.

  • Question 46:

    A large e-commerce organization is planning to implement a vulnerability assessment solution to enhance its security posture. They require a solution that imitates the outside view of attackers, performs well-organized inference-based testing, scans automatically against continuously updated databases, and supports multiple networks. Given these requirements, which type of vulnerability assessment solution would be most appropriate?

    A. Inference-based assessment solution

    B. Service-based solution offered by an auditing firm

    C. Tree-based assessment approach

    D. Product-based solution installed on a private network

  • Question 47:

    An ethical hacker is hired to evaluate the defenses of an organization's database system which is known to employ a signature-based IDS. The hacker knows that some SQL Injection evasion techniques may allow him to bypass the system's signatures. During the operation, he successfully retrieved a list of usernames from the database without triggering an alarm by employing an advanced evasion technique. Which of the following could he have used?

    A. Utilizing the char encoding function to convert hexadecimal and decimal values into characters that pass-through SQL engine parsing

    B. Using the URL encoding method to replace characters with their ASCII codes in hexadecimal form

    C. Implementing sophisticated matches such as "OR `john' = john" in place of classical matches like "OR 1-1"

    D. Manipulating white spaces in SQL queries to bypass signature detection

  • Question 48:

    Your network infrastructure is under a SYN flood attack. The attacker has crafted an automated botnet to simultaneously send `s' SYN packets per second to the server. You have put measures in place to manage `f' SYN packets per second, and the system is designed to deal with this number without any performance issues. If `s' exceeds `f', the network infrastructure begins to show signs of overload. The system's response time increases exponentially (2^k), where `k' represents each additional SYN packet above the `f' limit. Now, considering `s=500' and different `f' values, in which scenario is the server most likely to experience overload and significantly increased response times?

    A. f=510: The server can handle 510 SYN packets per second, which is greater than what the attacker is sending. The system stays stable, and the response time remains unaffected

    B. f=495: The server can handle 495 SYN packets per second. The response time drastically rises (245 = 32 times the normal), indicating a probable system overload

    C. f=S05: The server can handle 505 SYN packets per second. In this case, the response time increases but not as drastically (245 = 32 times the normal), and the systern might still function, albeit slowly

    D. f=420: The server can handle 490 SYN packets per second. With 's' exceeding `f by 10, the response time shoots up (2410 = 1024 times the usual response time), indicating a system overload

  • Question 49:

    A penetration tester is tasked with gathering information about the subdomains of a target organization's website. The tester needs a versatile and efficient solution for the task. Which of the following options would be the most effective method to accomplish this goal?

    A. Employing a tool like Sublist3r, which is designed to enumerate the subdomains of websites using OSINT

    B. Analyzing Linkedin profiles to find employees of the target company and their job titles

    C. Utilizing the Harvester tool to extract email addresses related to the target domain using a search engine like Google or Bing

    D. Using a people search service, such as Spokeo or Intelius, to gather information about the employees of the target organization

  • Question 50:

    A security analyst is investigating a potential network-level session hijacking incident. During the investigation, the analyst finds that the attacker has been using a technique in which they injected an authentic-looking reset packet using a spoofed source IP address and a guessed acknowledgment number. As a result, the victim's connection was reset. Which of the following hijacking techniques has the attacker most likely used?

    A. TCP/IP hijacking

    B. UDP hijacking

    C. RST hijacking

    D. Blind hijacking

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.