Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :Apr 16, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 531:

    The establishment of a TCP connection involves a negotiation called three-way handshake. What type of message does the client send to the server in order to begin this negotiation?

    A. ACK

    B. SYN

    C. RST

    D. SYN-ACK

  • Question 532:

    You receive an e-mail like the one shown below. When you click on the link contained in the mail, you are redirected to a website seeking you to download free Anti-Virus software.

    Dear valued customers,

    We are pleased to announce the newest version of Antivirus 2010 for Windows which will probe you with total security against the latest spyware, malware, viruses, Trojans and other online threats. Simply visit the link below and enter your

    antivirus code:

    or you may contact us at the following address:

    Media Internet Consultants, Edif. Neptuno, Planta

    Baja, Ave. Ricardo J. Alfaro, Tumba Muerto, n/a Panama How will you determine if this is Real Anti-Virus or Fake Anti-Virus website?

    A. Look at the website design, if it looks professional then it is a Real Anti-Virus website

    B. Connect to the site using SSL, if you are successful then the website is genuine

    C. Search using the URL and Anti-Virus product name into Google and lookout for suspicious warnings against this site

    D. Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware

    E. Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware

  • Question 533:

    Wilson, a professional hacker, targets an organization for financial benefit and plans to compromise its systems by sending malicious emails. For this purpose, he uses a tool to track the emails of the target and extracts information such as sender identities, mall servers, sender IP addresses, and sender locations from different public sources. He also checks if an email address was leaked using the haveibeenpwned.com API. Which of the following tools is used by Wilson in the above scenario?

    A. Factiva

    B. Netcraft

    C. infoga

    D. Zoominfo

  • Question 534:

    Bob wants to ensure that Alice can check whether his message has been tampered with. He creates a checksum of the message and encrypts it using asymmetric cryptography. What key does Bob use to encrypt the checksum for accomplishing this goal?

    A. Alice's private key

    B. Alice's public key

    C. His own private key

    D. His own public key

  • Question 535:

    A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?

    A. Perform a vulnerability scan of the system.

    B. Determine the impact of enabling the audit feature.

    C. Perform a cost/benefit analysis of the audit feature.

    D. Allocate funds for staffing of audit log review.

  • Question 536:

    Study the following log extract and identify the attack.

    A. Hexcode Attack

    B. Cross Site Scripting

    C. Multiple Domain Traversal Attack

    D. Unicode Directory Traversal Attack

  • Question 537:

    Mason, a professional hacker, targets an organization and spreads Emotet malware through malicious script. After infecting the victim's device. Mason further used Emotet to spread the infection across local networks and beyond to compromise as many machines as possible. In this process, he used a tool, which is a self-extracting RAR file, to retrieve information related to network resources such as writable share drives. What is the tool employed by Mason in the above scenario?

    A. NetPass.exe

    B. Outlook scraper

    C. WebBrowserPassView

    D. Credential enumerator

  • Question 538:

    Harris is attempting to identify the OS running on his target machine. He inspected the initial TTL in the IP header and the related TCP window size and obtained the following results:

    TTL: 64 Window Size: 5840

    What is the OS running on the target machine?

    A. Solaris OS

    B. Windows OS

    C. Mac OS

    D. Linux OS

  • Question 539:

    Which type of security feature stops vehicles from crashing through the doors of a building?

    A. Bollards

    B. Receptionist

    C. Mantrap

    D. Turnstile

  • Question 540:

    An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the network's external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file. What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?

    A. Protocol analyzer

    B. Network sniffer

    C. Intrusion Prevention System (IPS)

    D. Vulnerability scanner

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.