Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :Apr 16, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 511:

    You are a penetration tester tasked with testing the wireless network of your client Brakeme SA. You are attempting to break into the wireless network with the SSID "Brakeme-lnternal." You realize that this network uses WPA3 encryption, which of the following vulnerabilities is the promising to exploit?

    A. Dragonblood

    B. Cross-site request forgery

    C. Key reinstallation attack

    D. AP Myconfiguration

  • Question 512:

    An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?

    A. Reverse Social Engineering

    B. Tailgating

    C. Piggybacking

    D. Announced

  • Question 513:

    Which of the following types of SQL injection attacks extends the results returned by the original query, enabling attackers to run two or more statements if they have the same structure as the original one?

    A. Error-based injection

    B. Boolean-based blind SQL injection

    C. Blind SQL injection

    D. Union SQL injection

  • Question 514:

    Morris, a professional hacker, performed a vulnerability scan on a target organization by sniffing the traffic on the network lo identify the active systems, network services, applications, and vulnerabilities. He also obtained the list of the users who are currently accessing the network. What is the type of vulnerability assessment that Morris performed on the target organization?

    A. internal assessment

    B. Passive assessment

    C. External assessment

    D. Credentialed assessment

  • Question 515:

    Internet Protocol Security IPsec is actually a suite pf protocols. Each protocol within the suite provides different functionality. Collective IPsec does everything except.

    A. Protect the payload and the headers

    B. Encrypt

    C. Work at the Data Link Layer

    D. Authenticate

  • Question 516:

    Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and

    authorized visitors but not for students.

    He identified this when the IDS alerted for malware activities in the network. What should Bob do to avoid this problem?

    A. Disable unused ports in the switches

    B. Separate students in a different VLAN

    C. Use the 802.1x protocol

    D. Ask students to use the wireless network

  • Question 517:

    An attacker decided to crack the passwords used by industrial control systems. In this process, he employed a loop strategy to recover these passwords. He used one character at a time to check whether the first character entered is correct;

    if so, he continued the loop for consecutive characters. If not, he terminated the loop. Furthermore, the attacker checked how much time the device took to finish one complete password authentication process, through which he deduced how

    many characters entered are correct.

    What is the attack technique employed by the attacker to crack the passwords of the industrial control systems?

    A. Side-channel attack

    B. Denial-of-service attack

    C. HMI-based attack

    D. Buffer overflow attack

  • Question 518:

    Which rootkit is characterized by its function of adding code and/or replacing some of the operating-system kernel code to obscure a backdoor on a system?

    A. User-mode rootkit

    B. Library-level rootkit

    C. Kernel-level rootkit

    D. Hypervisor-level rootkit

  • Question 519:

    Which DNS resource record can indicate how long any "DNS poisoning" could last?

    A. MX

    B. SOA

    C. NS

    D. TIMEOUT

  • Question 520:

    A newly joined employee, Janet, has been allocated an existing system used by a previous employee. Before issuing the system to Janet, it was assessed by Martin, the administrator. Martin found that there were possibilities of compromise through user directories, registries, and other system parameters. He also identified vulnerabilities such as native configuration tables, incorrect registry or file permissions, and software configuration errors. What is the type of vulnerability assessment performed by Martin?

    A. Credentialed assessment

    B. Database assessment

    C. Host-based assessment

    D. Distributed assessment

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.