Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :Apr 16, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 491:

    _________ is a type of phishing that targets high-profile executives such as CEOs, CFOs, politicians, and celebrities who have access to confidential and highly valuable information.

    A. Spear phishing

    B. Whaling

    C. Vishing

    D. Phishing

  • Question 492:

    What did the following commands determine?

    A. That the Joe account has a SID of 500

    B. These commands demonstrate that the guest account has NOT been disabled

    C. These commands demonstrate that the guest account has been disabled

    D. That the true administrator is Joe

    E. Issued alone, these commands prove nothing

  • Question 493:

    Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end- to-end encryption of the connection?

    A. SFTP

    B. Ipsec

    C. SSL

    D. FTPS

  • Question 494:

    Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?

    A. ACK flag probe scanning

    B. ICMP Echo scanning

    C. SYN/FIN scanning using IP fragments

    D. IPID scanning

  • Question 495:

    An attacker utilizes a Wi-Fi Pineapple to run an access point with a legitimate-looking SSID for a nearby business in order to capture the wireless password. What kind of attack is this?

    A. MAC spoofing attack

    B. Evil-twin attack

    C. War driving attack

    D. Phishing attack

  • Question 496:

    Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient's consent, similar to email spamming?

    A. Bluesmacking

    B. BlueSniffing

    C. Bluejacking

    D. Bluesnarfing

  • Question 497:

    Which of the following Metasploit post-exploitation modules can be used to escalate privileges on Windows systems?

    A. getsystem

    B. getuid

    C. keylogrecorder

    D. autoroute

  • Question 498:

    In an attempt to increase the security of your network, you implement a solution that will help keep your wireless network undiscoverable and accessible only to those that know it. How do you accomplish this?

    A. Delete the wireless network

    B. Remove all passwords

    C. Lock all users

    D. Disable SSID broadcasting

  • Question 499:

    Which among the following is the best example of the third step (delivery) in the cyber kill chain?

    A. An intruder sends a malicious attachment via email to a target.

    B. An intruder creates malware to be used as a malicious attachment to an email.

    C. An intruder's malware is triggered when a target opens a malicious email attachment.

    D. An intruder's malware is installed on a target's machine.

  • Question 500:

    Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?

    A. ESP transport mode

    B. ESP confidential

    C. AH permiscuous

    D. AH Tunnel mode

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.