Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :May 18, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 171:

    You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity, what tool would you most likely select?

    A. Nmap

    B. Cain and Abel

    C. Nessus

    D. Snort

  • Question 172:

    While scanning with Nmap, Patin found several hosts which have the IP ID of incremental sequences. He then decided to conduct: nmap -Pn -p- -si kiosk.adobe.com www.riaa.com. kiosk.adobe.com is the host with incremental IP ID

    sequence.

    What is the purpose of using "-si" with Nmap?

    A. Conduct stealth scan

    B. Conduct ICMP scan

    C. Conduct IDLE scan

    D. Conduct silent scan

  • Question 173:

    Vlady works in a fishing company where the majority of the employees have very little understanding of IT let alone IT Security. Several information security issues that Vlady often found includes, employees sharing password, writing his/her password on a post it note and stick it to his/her desk, leaving the computer unlocked, didn't log out from emails or other social media accounts, and etc. After discussing with his boss, Vlady decided to make some changes to improve the security environment in his company. The first thing that Vlady wanted to do is to make the employees understand the importance of keeping confidential information, such as password, a secret and they should not share it with other persons. Which of the following steps should be the first thing that Vlady should do to make the employees in his company understand to importance of keeping confidential information a secret?

    A. Warning to those who write password on a post it note and put it on his/her desk

    B. Developing a strict information security policy

    C. Information security awareness training

    D. Conducting a one to one discussion with the other employees about the importance of information security

  • Question 174:

    Nicolas just found a vulnerability on a public-facing system that is considered a zero-day vulnerability. He sent an email to the owner of the public system describing the problem and how the owner can protect themselves from that vulnerability. He also sent an email to Microsoft informing them of the problem that their systems are exposed to. What type of hacker is Nicolas?

    A. Red hat

    B. White hat

    C. Black hat

    D. Gray hat

  • Question 175:

    You are logged in as a local admin on a Windows 7 system and you need to launch the Computer Management Console from command line. Which command would you use?

    A. c:\compmgmt.msc

    B. c:\services.msc

    C. c:\ncpa.cp

    D. c:\gpedit

  • Question 176:

    Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?

    A. Nikto

    B. John the Ripper

    C. Dsniff

    D. Snort

  • Question 177:

    Which Metasploit Framework tool can help penetration tester for evading Anti-virus Systems?

    A. msfpayload

    B. msfcli

    C. msfd

    D. msfencode

  • Question 178:

    Attacker Rony Installed a rogue access point within an organization's perimeter and attempted to Intrude into its internal network. Johnson, a security auditor, identified some unusual traffic in the internal network that is aimed at cracking the authentication mechanism. He immediately turned off the targeted network and tested for any weak and outdated security mechanisms that are open to attack. What is the type of vulnerability assessment performed by Johnson in the above scenario?

    A. Distributed assessment

    B. Wireless network assessment

    C. Most-based assessment

    D. Application assessment

  • Question 179:

    A large mobile telephony and data network operator has a data center that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems. What is the best security policy concerning this setup?

    A. Network elements must be hardened with user ids and strong passwords. Regular security tests and audits should be performed.

    B. As long as the physical access to the network elements is restricted, there is no need for additional measures.

    C. There is no need for specific security measures on the network elements as long as firewalls and IPS systems exist.

    D. The operator knows that attacks and down time are inevitable and should have a backup site.

  • Question 180:

    Which of the following web vulnerabilities would an attacker be attempting to exploit if they delivered the following input?

    ] >

    A. XXE

    B. SQLi

    C. IDOR

    D. XXS

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.