Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :Apr 16, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 501:

    The network users are complaining because their system are slowing down. Further, every time they attempt to go a website, they receive a series of pop-ups with advertisements. What types of malware have the system been infected with?

    A. Virus

    B. Spyware

    C. Trojan

    D. Adware

  • Question 502:

    Scenario1:

    1.Victim opens the attacker's web site.

    2.Attacker sets up a web site which contains interesting and attractive content like 'Do you want to make $1000 in a day?'.

    3.Victim clicks to the interesting and attractive content URL.

    4.Attacker creates a transparent 'iframe' in front of the URL which victim attempts to click, so victim thinks that he/she clicks to the 'Do you want to make $1000 in a day?' URL but actually he/she clicks to the content or URL that exists in the transparent 'iframe' which is setup by the attacker.

    What is the name of the attack which is mentioned in the scenario?

    A. Session Fixation

    B. HTML Injection

    C. HTTP Parameter Pollution

    D. Clickjacking Attack

  • Question 503:

    John, a security analyst working for an organization, found a critical vulnerability on the organization's LAN that allows him to view financial and personal information about the rest of the employees. Before reporting the vulnerability, he examines the information shown by the vulnerability for two days without disclosing any information to third parties or other internal employees. He does so out of curiosity about the other employees and may take advantage of this information later. What would John be considered as?

    A. Cybercriminal

    B. Black hat

    C. White hat

    D. Gray hat

  • Question 504:

    Log monitoring tools performing behavioral analysis have alerted several suspicious logins on a Linux server occurring during non-business hours. After further examination of all login activities, it is noticed that none of the logins have occurred during typical work hours. A Linux administrator who is investigating this problem realizes the system time on the Linux server is wrong by more than twelve hours. What protocol used on Linux servers to synchronize the time has stopped working?

    A. Time Keeper

    B. NTP

    C. PPP

    D. OSPP

  • Question 505:

    Mr. Omkar performed tool-based vulnerability assessment and found two vulnerabilities. During analysis, he found that these issues are not true vulnerabilities. What will you call these issues?

    A. False positives

    B. True negatives

    C. True positives

    D. False negatives

  • Question 506:

    Email is transmitted across the Internet using the Simple Mail Transport Protocol. SMTP does not encrypt email, leaving the information in the message vulnerable to being read by an unauthorized person. SMTP can upgrade a connection between two mail servers to use TLS. Email transmitted by SMTP over TLS is encrypted. What is the name of the command used by SMTP to transmit email over TLS?

    A. OPPORTUNISTICTLS

    B. UPGRADETLS

    C. FORCETLS

    D. STARTTLS

  • Question 507:

    Samuel a security administrator, is assessing the configuration of a web server. He noticed that the server permits SSlv2 connections, and the same private key certificate is used on a different server that allows SSLv2 connections. This

    vulnerability makes the web server vulnerable to attacks as the SSLv2 server can leak key information.

    Which of the following attacks can be performed by exploiting the above vulnerability?

    A. DROWN attack

    B. Padding oracle attack

    C. Side-channel attack

    D. DUHK attack

  • Question 508:

    Jude, a pen tester working in Keiltech Ltd., performs sophisticated security testing on his company's network infrastructure to identify security loopholes. In this process, he started to circumvent the network protection tools and firewalls used

    in the company. He employed a technique that can create forged TCP sessions by carrying out multiple SYN, ACK, and RST or FIN packets. Further, this process allowed Jude to execute DDoS attacks that can exhaust the network

    resources.

    What is the attack technique used by Jude for finding loopholes in the above scenario?

    A. UDP flood attack

    B. Ping-of-death attack

    C. Spoofed session flood attack

    D. Peer-to-peer attack

  • Question 509:

    In the Common Vulnerability Scoring System (CVSS) v3.1 severity ratings, what range does medium vulnerability fall in?

    A. 3.0-6.9

    B. 40-6.0

    C. 4.0-6.9

    D. 3.9-6.9

  • Question 510:

    Richard, an attacker, targets an MNC. in this process, he uses a footprinting technique to gather as much information as possible. Using this technique, he gathers domain information such as the target domain name, contact details of its owner, expiry date, and creation date. With this information, he creates a map of the organization's network and misleads domain owners with social engineering to obtain internal details of its network. What type of footprinting technique is employed by Richard?

    A. VoIP footprinting

    B. VPN footprinting

    C. Whois footprinting

    D. Email footprinting

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.