Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :May 18, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 201:

    Calvin, a grey-hat hacker, targets a web application that has design flaws in its authentication mechanism. He enumerates usernames from the login form of the web application, which requests users to feed data and specifies the incorrect

    field in case of invalid credentials. Later, Calvin uses this information to perform social engineering.

    Which of the following design flaws in the authentication mechanism is exploited by Calvin?

    A. Insecure transmission of credentials

    B. Verbose failure messages

    C. User impersonation

    D. Password reset mechanism

  • Question 202:

    Allen, a professional pen tester, was hired by XpertTech Solutions to perform an attack simulation on the organization's network resources. To perform the attack, he took advantage of the NetBIOS API and targeted the NetBIOS service. By

    enumerating NetBIOS, he found that port 139 was open and could see the resources that could be accessed or viewed on a remote system. He came across many NetBIOS codes during enumeration.

    Identify the NetBIOS code used for obtaining the messenger service running for the logged-in user?

    A. <1B>

    B. <00>

    C. <03>

    D. <20>

  • Question 203:

    Which of the following is the structure designed to verify and authenticate the identity of individuals within the enterprise taking part in a data exchange?

    A. SOA

    B. biometrics

    C. single sign on

    D. PKI

  • Question 204:

    Mirai malware targets loT devices. After infiltration, it uses them to propagate and create botnets that then used to launch which types of attack?

    A. MITM attack

    B. Birthday attack

    C. DDoS attack

    D. Password attack

  • Question 205:

    Andrew is an Ethical Hacker who was assigned the task of discovering all the active devices hidden by a restrictive firewall in the IPv4 range in a given target network. Which of the following host discovery techniques must he use to perform the given task?

    A. UDP scan

    B. TCP Maimon scan

    C. arp ping scan

    D. ACK flag probe scan

  • Question 206:

    Which of the following are well known password-cracking programs?

    A. L0phtcrack

    B. NetCat

    C. Jack the Ripper

    D. Netbus

    E. John the Ripper

  • Question 207:

    An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the

    investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up.

    What is the most likely cause?

    A. The network devices are not all synchronized.

    B. Proper chain of custody was not observed while collecting the logs.

    C. The attacker altered or erased events from the logs.

    D. The security breach was a false positive.

  • Question 208:

    A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student

    decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted.

    Which cryptography attack is the student attempting?

    A. Man-in-the-middle attack

    B. Brute-force attack

    C. Dictionary attack

    D. Session hijacking

  • Question 209:

    While performing online banking using a Web browser, a user receives an email that contains a link to an interesting Web site. When the user clicks on the link, another Web browser session starts and displays a video of cats playing a piano.

    The next business day, the user receives what looks like an email from his bank, indicating that his bank account has been accessed from a foreign country. The email asks the user to call his bank and verify the authorization of a funds

    transfer that took place.

    What Web browser-based security vulnerability was exploited to compromise the user?

    A. Clickjacking

    B. Cross-Site Scripting

    C. Cross-Site Request Forgery

    D. Web form input validation

  • Question 210:

    Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST

    packet is sent in response by the target host, indicating that the port is closed.

    What is the port scanning technique used by Sam to discover open ports?

    A. Xmas scan

    B. IDLE/IPID header scan

    C. TCP Maimon scan

    D. ACK flag probe scan

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.