Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :Apr 16, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 521:

    What does the following command in netcat do? nc -l -u -p55555 < /etc/passwd

    A. logs the incoming connections to /etc/passwd file

    B. loads the /etc/passwd file to the UDP port 55555

    C. grabs the /etc/passwd file when connected to UDP port 55555

    D. deletes the /etc/passwd file when connected to the UDP port 55555

  • Question 522:

    Websites and web portals that provide web services commonly use the Simple Object Access Protocol (SOAP). Which of the following is an incorrect definition or characteristics of the protocol?

    A. Exchanges data between web services

    B. Only compatible with the application protocol HTTP

    C. Provides a structured model for messaging

    D. Based on XML

  • Question 523:

    Which of the following allows attackers to draw a map or outline the target organization's network infrastructure to know about the actual environment that they are going to hack.

    A. Enumeration

    B. Vulnerability analysis

    C. Malware analysis

    D. Scanning networks

  • Question 524:

    Joe works as an IT administrator in an organization and has recently set up a cloud computing service for the organization. To implement this service, he reached out to a telecom company for providing Internet connectivity and transport services between the organization and the cloud service provider, in the NIST cloud deployment reference architecture, under which category does the telecom company fall in the above scenario?

    A. Cloud booker

    B. Cloud consumer

    C. Cloud carrier

    D. Cloud auditor

  • Question 525:

    To invisibly maintain access to a machine, an attacker utilizes a toolkit that sits undetected In the core components of the operating system. What is this type of rootkit an example of?

    A. Mypervisor rootkit

    B. Kernel toolkit

    C. Hardware rootkit

    D. Firmware rootkit

  • Question 526:

    Josh has finished scanning a network and has discovered multiple vulnerable services. He knows that several of these usually have protections against external sources but are frequently susceptible to internal users. He decides to draft an email, spoof the sender as the internal IT team, and attach a malicious file disguised as a financial spreadsheet. Before Josh sends the email, he decides to investigate other methods of getting the file onto the system. For this particular attempt, what was the last stage of the cyber kill chain that Josh performed?

    A. Exploitation

    B. Weaponization

    C. Delivery

    D. Reconnaissance

  • Question 527:

    What is GINA?

    A. Gateway Interface Network Application

    B. GUI Installed Network Application CLASS

    C. Global Internet National Authority (G-USA)

    D. Graphical Identification and Authentication DLL

  • Question 528:

    When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of

    the SYN/ACK before the connection is established. This is referred to as the "TCP three-way handshake." While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting

    to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK.

    How would an attacker exploit this design by launching TCP SYN attack?

    A. Attacker generates TCP SYN packets with random destination addresses towards a victim host

    B. Attacker floods TCP SYN packets with random source addresses towards a victim host

    C. Attacker generates TCP ACK packets with random source addresses towards a victim host

    D. Attacker generates TCP RST packets with random source addresses towards a victim host

  • Question 529:

    Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?

    A. 113

    B. 69

    C. 123

    D. 161

  • Question 530:

    What two conditions must a digital signature meet?

    A. Has to be the same number of characters as a physical signature and must be unique.

    B. Has to be unforgeable, and has to be authentic.

    C. Must be unique and have special characters.

    D. Has to be legible and neat.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.