Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :Apr 16, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 61:

    A network security analyst, while conducting penetration testing, is aiming to identify a service account password using the Kerberos authentication protocol. They have a valid user authentication ticket (TGT) and decided to carry out a

    Kerberoasting attack.

    In the scenario described, which of the following steps should the analyst take next?

    A. Carry out a passive wire sniffing operation using Internet packet sniffers

    B. Extract plaintext passwords, hashes, PIN codes, and Kerberos tickets using a tool like Mimikatz

    C. Perform a PRobability INfinite Chained Elements (PRINCE) attack

    D. Request a service ticket for the service principal name of the target service account

  • Question 62:

    Sarah, a system administrator, was alerted of potential malicious activity on the network of her company. She discovered a malicious program spread through the instant messenger application used by her team. The attacker had obtained access to one of her teammate's messenger accounts and started sending files across the contact list. Which best describes the attack scenario and what measure could have prevented it?

    A. Instant Messenger Applications; verifying the sender's identity before opening any files.

    B. Insecure Patch Management; updating application software regularly.

    C. Rogue/Decoy Applications; ensuring software is labeled as TRUSTED.

    D. Portable Hardware Media/Removable Devices; disabling Autorun functionality.

  • Question 63:

    A Certified Ethical Hacker (CEH) is given the task to perform an LDAP enumeration on a target system. The system is secured and accepts connections only on secure LDAP. The CEH uses Python for the enumeration process. After successfully installing LDAP and establishing a connection with the target, he attempts to fetch details like the domain name and naming context but is unable to receive the expected response. Considering the circumstances, which of the following is the most plausible reason for this situation?

    A. The Python version installed on the CEH's machine is incompatible with the Idap3 library

    B. The secure LDAP connection was not properly initialized due to a lack of 'use_ssl = True' in the server object creation

    C. The enumeration process was blocked by the target system's intrusion detection system

    D. The system failed to establish a connection due to an incorrect port number

  • Question 64:

    As a part of an ethical hacking exercise, an attacker is probing a target network that is suspected to employ various honeypot systems for security. The attacker needs to detect and bypass these honeypots without alerting the target. The attacker decides to utilize a suite of techniques. Which of the following techniques would NOT assist in detecting a honeypot?

    A. Probing system services and observing the three-way handshake

    B. Using honeypot detection tools like Send-Safe Honeypot Hunter

    C. Implementing a brute force attack to verify system vulnerability

    D. Analyzing the MAC address to detect instances running on VMware

  • Question 65:

    An audacious attacker is targeting a web server you oversee. He intends to perform a Slow HTTP POST attack, by manipulating 'a' HTTP connection. Each connection sends a byte of data every 'b' second, effectively holding up the

    connections for an extended period. Your server is designed to manage 'm' connections per second, but any connections exceeding this number tend to overwhelm the system. Given `a=100' and variable 'm', along with the attacker's intention

    of maximizing the attack duration 'D=a*b', consider the following scenarios.

    Which is most likely to result in the longest duration of server unavailability?

    A. m=110, b=20: Despite the attacker sending 100 connections, the server can handle 110 connections per second, therefore likely staying operative, regardless of the hold-up time per connection

    B. m=90, b=15: The server can manage 90 connections per second, but the attacker's 100 connections exceed this, and with each connection held up for 15 seconds, the attack duration could be significant

    C. 95, b=10: Here, the server can handle 95 connections per second, but it falls short against the attacker's 100 connections, albeit the hold-up time per connection is lower

    D. m=105, b=12: The server can manage 105 connections per second, more than the attacker's 100 connections, likely maintaining operation despite a moderate hold-up time

  • Question 66:

    In the process of implementing a network vulnerability assessment strategy for a tech company, the security analyst is confronted with the following scenarios:

    1) A legacy application is discovered on the network, which no longer receives updates from the vendor.

    2) Several systems in the network are found running outdated versions of web browsers prone to distributed attacks.

    3) The network firewall has been configured using default settings and passwords.

    4) Certain TCP/IP protocols used in the organization are inherently insecure.

    The security analyst decides to use vulnerability scanning software. Which of the following limitations of vulnerability assessment should the analyst be most cautious about in this context?

    A. Vulnerability scanning software is limited in its ability to perform live tests on web applications to detect errors or unexpected behavior.

    B. Vulnerability scanning software cannot define the impact of an identified vulnerability on different business operations.

    C. Vulnerability scanning software is limited in its ability to detect vulnerabilities at a given point in time.

    D. Vulnerability scanning software is not immune to software engineering flaws that might lead to serious vulnerabilities being missed.

  • Question 67:

    A large corporate network is being subjected to repeated sniffing attacks. To increase security, the company's IT department decides to implement a combination of several security measures. They permanently add the MAC address of the gateway to the ARP cache, switch to using IPv6 instead of IPv4, implement the use of encrypted sessions such as SSH instead of Telnet, and use Secure File Transfer Protocol instead of FTP. However, they are still faced with the threat of sniffing. Considering the countermeasures, what should be their next step to enhance network security?

    A. Use HTTP instead of HTTPS for protecting usernames and passwords.

    B. Implement network scanning and monitoring tools.

    C. Enable network identification broadcasts.

    D. Retrieve MAC addresses from the OS.

  • Question 68:

    You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has Snort installed, and the second machine (192.168.0.150) has Kiwi Syslog installed. You perform a SYN scan in your network, and you notice that Kiwi Syslog is not receiving the alert message from Snort. You decide to run Wireshark in the Snort machine to check if the messages are going to the Kiwi Syslog machine. What Wireshark filter will show the connections from the Snort machine to Kiwi Syslog machine?

    A. tcp.srcport= = 514 andand ip.src= = 192.168.0.99

    B. tcp.srcport= = 514 andand ip.src= = 192.168.150

    C. tcp.dstport= = 514 andand ip.dst= = 192.168.0.99

    D. tcp.dstport= = 514 andand ip.dst= = 192.168.0.150

  • Question 69:

    The change of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from the last backup to the new hard disk. The recovery person earns $10/hour. Calculate the SLE, ARO, and ALE. Assume the EF = 1(100%). What is the closest approximate cost of this replacement and recovery operation per year?

    A. $1320

    B. $440

    C. $100

    D. $146

  • Question 70:

    Nedved is an IT Security Manager of a bank in his country. One day. he found out that there is a security breach to his company's email server based on analysis of a suspicious connection from the email server to an unknown IP Address. What is the first thing that Nedved needs to do before contacting the incident response team?

    A. Leave it as it Is and contact the incident response te3m right away

    B. Block the connection to the suspicious IP Address from the firewall

    C. Disconnect the email server from the network

    D. Migrate the connection to the backup email server

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.