Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :May 18, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 181:

    What is a NULL scan?

    A. A scan in which all flags are turned off

    B. A scan in which certain flags are off

    C. A scan in which all flags are on

    D. A scan in which the packet size is set to zero

    E. A scan with an illegal packet size

  • Question 182:

    What is the proper response for a NULL scan if the port is closed?

    A. SYN

    B. ACK

    C. FIN

    D. PSH

    E. RST

    F. No response

  • Question 183:

    Harper, a software engineer, is developing an email application. To ensure the confidentiality of email messages. Harper uses a symmetric-key block cipher having a classical 12- or 16-round Feistel network with a block size of 64 bits for

    encryption, which includes large 8 x 32-bit S-boxes (S1, S2, S3, S4) based on bent functions, modular addition and subtraction, key-dependent rotation, and XOR operations. This cipher also uses a masking key(Km1)and a rotation key (Kr1)

    for performing its functions.

    What is the algorithm employed by Harper to secure the email messages?

    A. CAST-128

    B. AES

    C. GOST block cipher

    D. DES

  • Question 184:

    In this attack, an adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying cryptographic handshake messages. When the victim reinstall the key, associated parameters such as the incremental transmit packet number and receive packet number are reset to their initial values. What is this attack called?

    A. Chop chop attack

    B. KRACK

    C. Evil twin

    D. Wardriving

  • Question 185:

    Which type of sniffing technique is generally referred as MiTM attack?

    A. Password Sniffing

    B. ARP Poisoning

    C. Mac Flooding

    D. DHCP Sniffing

  • Question 186:

    What firewall evasion scanning technique make use of a zombie system that has low network activity as well as its fragment identification numbers?

    A. Decoy scanning

    B. Packet fragmentation scanning

    C. Spoof source address scanning

    D. Idle scanning

  • Question 187:

    Eric, a cloud security engineer, implements a technique for securing the cloud resources used by his organization. This technique assumes by default that a user attempting to access the network is not an authentic entity and verifies every

    incoming connection before allowing access to the network. Using this technique, he also imposed conditions such that employees can access only the resources required for their role.

    What is the technique employed by Eric to secure cloud resources?

    A. Serverless computing

    B. Demilitarized zone

    C. Container technology

    D. Zero trust network

  • Question 188:

    Mary, a penetration tester, has found password hashes in a client system she managed to breach. She needs to use these passwords to continue with the test, but she does not have time to find the passwords that correspond to these

    hashes.

    Which type of attack can she implement in order to continue?

    A. LLMNR/NBT-NS poisoning

    B. Internal monologue attack

    C. Pass the ticket

    D. Pass the hash

  • Question 189:

    Kevin, a professional hacker, wants to penetrate CyberTech Inc.'s network. He employed a technique, using which he encoded packets with Unicode characters. The company's IDS cannot recognize the packet, but the target web server can decode them.

    What is the technique used by Kevin to evade the IDS system?

    A. Desynchronization

    B. Obfuscating

    C. Session splicing

    D. Urgency flag

  • Question 190:

    Peter, a Network Administrator, has come to you looking for advice on a tool that would help him perform SNMP queries over the network. Which of these tools would perform the SNMP enumeration he is looking for?

    A. SNMPUtil

    B. SNScan

    C. SNMPScan

    D. Solarwinds IP Network Browser

    E. NMap

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.