Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :Apr 16, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 561:

    Henry is a penetration tester who works for XYZ organization. While performing enumeration on a client organization, he queries the DNS server for a specific cached DNS record. Further, by using this cached record, he determines the sites recently visited by the organization's user. What is the enumeration technique used by Henry on the organization?

    A. DNS zone walking

    B. DNS cache snooping

    C. DNS SEC zone walking

    D. DNS cache poisoning

  • Question 562:

    How can rainbow tables be defeated?

    A. Use of non-dictionary words

    B. All uppercase character passwords

    C. Password salting

    D. Lockout accounts under brute force password cracking attempts

  • Question 563:

    Stephen, an attacker, targeted the industrial control systems of an organization. He generated a fraudulent email with a malicious attachment and sent it to employees of the target organization. An employee who manages the sales software of the operational plant opened the fraudulent email and clicked on the malicious attachment. This resulted in the malicious attachment being downloaded and malware being injected into the sales software maintained in the victim's system. Further, the malware propagated itself to other networked systems, finally damaging the industrial automation components. What is the attack technique used by Stephen to damage the industrial systems?

    A. Spear-phishing attack

    B. SMishing attack

    C. Reconnaissance attack

    D. HMI-based attack

  • Question 564:

    Mary found a high vulnerability during a vulnerability scan and notified her server team. After analysis, they sent her proof that a fix to that issue had already been applied. The vulnerability that Marry found is called what?

    A. False-negative

    B. False-positive

    C. Brute force attack

    D. Backdoor

  • Question 565:

    How does a denial-of-service attack work?

    A. A hacker prevents a legitimate user (or group of users) from accessing a service

    B. A hacker uses every character, word, or letter he or she can think of to defeat authentication

    C. A hacker tries to decipher a password by using a system, which subsequently crashes the network

    D. A hacker attempts to imitate a legitimate user by confusing a computer or even another person

  • Question 566:

    Ethical hacker Jane Doe is attempting to crack the password of the head of the IT department at ABC Company. She is utilizing a rainbow table and notices that, upon entering a password, extra characters are added to the password after submission. What countermeasure is the company using to protect against rainbow tables?

    A. Password key hashing

    B. Password salting

    C. Password hashing

    D. Account lockout

  • Question 567:

    In Trojan terminology, what is a covert channel?

    A. A channel that transfers information within a computer system or network in a way that violates the security policy

    B. A legitimate communication path within a computer system or network for transfer of data

    C. It is a kernel operation that hides boot processes and services to mask detection

    D. It is Reverse tunneling technique that uses HTTPS protocol instead of HTTP protocol to establish connections

  • Question 568:

    Which system consists of a publicly available set of databases that contain domain name registration contact information?

    A. WHOIS

    B. CAPTCHA

    C. IANA

    D. IETF

  • Question 569:

    Scenario: Joe turns on his home computer to access personal online banking. When he enters the URL www.bank.com. the website is displayed, but it prompts him to re-enter his credentials as if he has never visited the site before. When he examines the website URL closer, he finds that the site is not secure and the web address appears different. What type of attack he is experiencing?.

    A. Dos attack

    B. DHCP spoofing

    C. ARP cache poisoning

    D. DNS hijacking

  • Question 570:

    Which type of malware spreads from one system to another or from one network to another and causes similar types of damage as viruses do to the infected system?

    A. Rootkit

    B. Trojan

    C. Worm

    D. Adware

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.