Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :May 18, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 191:

    Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between the two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric is relaying the information between the two. What would you call this attack?

    A. Interceptor

    B. Man-in-the-middle

    C. ARP Proxy

    D. Poisoning Attack

  • Question 192:

    Clark, a professional hacker, was hired by an organization lo gather sensitive Information about its competitors surreptitiously. Clark gathers the server IP address of the target organization using Whole footprinting. Further, he entered the server IP address as an input to an online tool to retrieve information such as the network range of the target organization and to identify the network topology and operating system used in the network. What is the online tool employed by Clark in the above scenario?

    A. AOL

    B. ARIN

    C. DuckDuckGo

    D. Baidu

  • Question 193:

    The Payment Card Industry Data Security Standard (PCI DSS) contains six different categories of control objectives. Each objective contains one or more requirements, which must be followed in order to achieve compliance. Which of the following requirements would best fit under the objective, "Implement strong access control measures"?

    A. Regularly test security systems and processes.

    B. Encrypt transmission of cardholder data across open, public networks.

    C. Assign a unique ID to each person with computer access.

    D. Use and regularly update anti-virus software on all systems commonly affected by malware.

  • Question 194:

    George is a security professional working for iTech Solutions. He was tasked with securely transferring sensitive data of the organization between industrial systems. In this process, he used a short-range communication protocol based on the IEEE 203.15.4 standard. This protocol is used in devices that transfer data infrequently at a low rate in a restricted area, within a range of 10-100 m. What is the short-range wireless communication technology George employed in the above scenario?

    A. MQTT

    B. LPWAN

    C. Zigbee

    D. NB-IoT

  • Question 195:

    Which of the following steps for risk assessment methodology refers to vulnerability identification?

    A. Determines if any flaws exist in systems, policies, or procedures

    B. Assigns values to risk probabilities; Impact values.

    C. Determines risk probability that vulnerability will be exploited (High. Medium, Low)

    D. Identifies sources of harm to an IT system. (Natural, Human. Environmental)

  • Question 196:

    Mike, a security engineer, was recently hired by BigFox Ltd. The company recently experienced disastrous DoS attacks. The management had instructed Mike to build defensive strategies for the company's IT infrastructure to thwart DoS/ DDoS attacks. Mike deployed some countermeasures to handle jamming and scrambling attacks. What is the countermeasure Mike applied to defend against jamming and scrambling attacks?

    A. Allow the usage of functions such as gets and strcpy

    B. Allow the transmission of all types of addressed packets at the ISP level

    C. Implement cognitive radios in the physical layer

    D. A Disable TCP SYN cookie protection

  • Question 197:

    Which type of attack attempts to overflow the content-addressable memory (CAM) table in an Ethernet switch?

    A. Evil twin attack

    B. DNS cache flooding

    C. MAC flooding

    D. DDoS attack

  • Question 198:

    What is the known plaintext attack used against DES which gives the result that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single key?

    A. Man-in-the-middle attack

    B. Meet-in-the-middle attack

    C. Replay attack

    D. Traffic analysis attack

  • Question 199:

    Gregory, a professional penetration tester working at Sys Security Ltd., is tasked with performing a security test of web applications used in the company. For this purpose, Gregory uses a tool to test for any security loopholes by hijacking a

    session between a client and server. This tool has a feature of intercepting proxy that can be used to inspect and modify the traffic between the browser and target application. This tool can also perform customized attacks and can be used to

    test the randomness of session tokens.

    Which of the following tools is used by Gregory in the above scenario?

    A. Nmap

    B. Burp Suite

    C. CxSAST

    D. Wireshark

  • Question 200:

    In an internal security audit, the white hat hacker gains control over a user account and attempts to acquire access to another account's confidential files and information. How can he achieve this?

    A. Privilege Escalation

    B. Shoulder-Surfing

    C. Hacking Active Directory

    D. Port Scanning

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.