Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :May 18, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 151:

    Sam is working as a system administrator in an organization. He captured the principal characteristics of a vulnerability and produced a numerical score to reflect its severity using CVSS v3.0 to property assess and prioritize the organization's vulnerability management processes. The base score that Sam obtained after performing CVSS rating was 4.0. What is the CVSS severity level of the vulnerability discovered by Sam in the above scenario?

    A. Medium

    B. Low

    C. Critical

    D. High

  • Question 152:

    Fingerprinting an Operating System helps a cracker because:

    A. It defines exactly what software you have installed

    B. It opens a security-delayed window based on the port being scanned

    C. It doesn't depend on the patches that have been applied to fix existing security holes

    D. It informs the cracker of which vulnerabilities he may be able to exploit on your system

  • Question 153:

    You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly. What is the best Nmap command you will use?

    A. nmap -T4 -q 10.10.0.0/24

    B. nmap -T4 -F 10.10.0.0/24

    C. nmap -T4 -r 10.10.1.0/24

    D. nmap -T4 -O 10.10.0.0/24

  • Question 154:

    Which is the first step followed by Vulnerability Scanners for scanning a network?

    A. OS Detection

    B. Firewall detection

    C. TCP/UDP Port scanning

    D. Checking if the remote host is alive

  • Question 155:

    When purchasing a biometric system, one of the considerations that should be reviewed is the processing speed. Which of the following best describes what it is meant by processing?

    A. The amount of time and resources that are necessary to maintain a biometric system

    B. How long it takes to setup individual user accounts

    C. The amount of time it takes to be either accepted or rejected from when an individual provides identification and authentication information

    D. The amount of time it takes to convert biometric data into a template on a smart card

  • Question 156:

    Which of the following is not a Bluetooth attack?

    A. Bluedriving

    B. Bluesmacking

    C. Bluejacking

    D. Bluesnarfing

  • Question 157:

    An attacker attaches a rogue router in a network. He wants to redirect traffic to a LAN attached to his router as part of a man-in-the-middle attack. What measure on behalf of the legitimate admin can mitigate this attack?

    A. Make sure that legitimate network routers are configured to run routing protocols with authentication.

    B. Disable all routing protocols and only use static routes

    C. Only using OSPFv3 will mitigate this risk.

    D. Redirection of the traffic cannot happen unless the admin allows it explicitly.

  • Question 158:

    You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?

    A. hping2 host.domain.com

    B. hping2 --set-ICMP host.domain.com

    C. hping2 -i host.domain.com

    D. hping2 -1 host.domain.com

  • Question 159:

    Which of the following is a component of a risk assessment?

    A. Administrative safeguards

    B. Physical security

    C. DMZ

    D. Logical interface

  • Question 160:

    Ron, a security professional, was pen testing web applications and SaaS platforms used by his company. While testing, he found a vulnerability that allows hackers to gain unauthorized access to API objects and perform actions such as view, update, and delete sensitive data of the company. What is the API vulnerability revealed in the above scenario?

    A. Code injections

    B. Improper use of CORS

    C. No ABAC validation

    D. Business logic flaws

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.