Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :Apr 16, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 71:

    This form of encryption algorithm is asymmetric key block cipher that is characterized by a 128-bit block size, and its key size can be up to 256 bits. Which among the following is this encryption algorithm?

    A. Twofish encryption algorithm

    B. HMAC encryption algorithm

    C. IDEA

    D. Blowfish encryption algorithm

  • Question 72:

    A company's policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department. Using Wireshark to examine the captured traffic, which command can be used as display filter to find unencrypted file transfers?

    A. tcp.port = = 21

    B. tcp.port = 23

    C. tcp.port = = 21 | | tcp.port = =22

    D. tcp.port ! = 21

  • Question 73:

    Richard, an attacker, targets an MNC In this process, he uses a footprinting technique to gather as much information as possible. Using this technique, he gathers domain information such as the target domain name, contact details of its

    owner, expiry date, and creation date.

    With this information, he creates a map of the organization's network and misleads domain owners with social engineering to obtain internal details of its network. What type of footprinting technique is employed by Richard?

    A. VPN footprinting

    B. Email footprinting

    C. VoIP footprinting

    D. Whois footprinting

  • Question 74:

    Richard, an attacker, aimed to hack loT devices connected to a target network. In this process. Richard recorded the frequency required to share information between connected devices. After obtaining the frequency, he captured the original data when commands were initiated by the connected devices. Once the original data were collected, he used free tools such as URH to segregate the command sequence. Subsequently, he started injecting the segregated command sequence on the same frequency into the loT network, which repeats the captured signals of the devices. What is the type of attack performed by Richard In the above scenario?

    A. Side-channel attack

    B. Replay attack

    C. CrypTanalysis attack

    D. Reconnaissance attack

  • Question 75:

    What is the first step for a hacker conducting a DNS cache poisoning (DNS spoofing) attack against an organization?

    A. The attacker queries a nameserver using the DNS resolver.

    B. The attacker makes a request to the DNS resolver.

    C. The attacker forges a reply from the DNS resolver.

    D. The attacker uses TCP to poison the ONS resofver.

  • Question 76:

    A company's security policy states that all Web browsers must automatically delete their HTTP browser cookies upon terminating. What sort of security breach is this policy attempting to mitigate?

    A. Attempts by attackers to access the user and password information stored in the company's SQL database.

    B. Attempts by attackers to access Web sites that trust the Web browser user by stealing the user's authentication credentials.

    C. Attempts by attackers to access password stored on the user's computer without the user's knowledge.

    D. Attempts by attackers to determine the user's Web browser usage patterns, including when sites were visited and for how long.

  • Question 77:

    Which of the following is the least-likely physical characteristic to be used in biometric control that supports a large company?

    A. Iris patterns

    B. Voice

    C. Height and Weight

    D. Fingerprints

  • Question 78:

    To determine if a software program properly handles a wide range of invalid input, a form of automated testing can be used to randomly generate invalid input in an attempt to crash the program. What term is commonly used when referring to this type of testing?

    A. Randomizing

    B. Bounding

    C. Mutating

    D. Fuzzing

  • Question 79:

    Boney, a professional hacker, targets an organization for financial benefits. He performs an attack by sending his session ID using an MITM attack technique. Boney first obtains a valid session ID by logging into a service and later feeds the

    same session 10 to the target employee. The session ID links the target employee to Boneys account page without disclosing any information to the victim. When the target employee clicks on the link, all the sensitive payment details entered

    in a form are linked to Boneys account.

    What is the attack performed by Boney in the above scenario?

    A. Session donation attack

    B. Session fixation attack

    C. Forbidden attack

    D. CRIME attack

  • Question 80:

    Which of these is capable of searching for and locating rogue access points?

    A. HIDS

    B. WISS

    C. WIPS

    D. NIDS

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.