Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :May 18, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 211:

    In the field of cryptanalysis, what is meant by a "rubber-hose" attack?

    A. Attempting to decrypt cipher text by making logical assumptions about the contents of the original plain text.

    B. Extraction of cryptographic secrets through coercion or torture.

    C. Forcing the targeted key stream through a hardware-accelerated device such as an ASIC.

    D. A backdoor placed into a cryptographic algorithm by its creator.

  • Question 212:

    Which of the following is a command line packet analyzer similar to GUI-based Wireshark?

    A. nessus

    B. tcpdump

    C. ethereal

    D. jack the ripper

  • Question 213:

    Kate dropped her phone and subsequently encountered an issue with the phone's internal speaker. Thus, she is using the phone's loudspeaker for phone calls and other activities. Bob, an attacker, takes advantage of this vulnerability and secretly exploits the hardware of Kate's phone so that he can monitor the loudspeaker's output from data sources such as voice assistants, multimedia messages, and audio files by using a malicious app to breach speech privacy. What is the type of attack Bob performed on Kate in the above scenario?

    A. Man-in-the-disk attack

    B. aLTEr attack

    C. SIM card attack

    D. Spearphone attack

  • Question 214:

    Which of the following programming languages is most susceptible to buffer overflow attacks, due to its lack of a built-in bounds checking mechanism?

    Code:

    #include int main(){char buffer[8];

    strcpy(buffer, ""11111111111111111111111111111"");} Output: Segmentation fault

    A. C#

    B. Python

    C. Java

    D. C++

  • Question 215:

    Alex, a cloud security engineer working in Eyecloud Inc. is tasked with isolating applications from the underlying infrastructure and stimulating communication via well- defined channels. For this purpose, he used an open-source technology that helped him in developing, packaging, and running applications; further, the technology provides PaaS through OS-level visualization, delivers containerized software packages, and promotes fast software delivery. What is the cloud technology employed by Alex in the above scenario?

    A. Virtual machine

    B. Serverless computing

    C. Docker

    D. Zero trust network

  • Question 216:

    Taylor, a security professional, uses a tool to monitor her company's website, analyze the website's traffic, and track the geographical location of the users visiting the company's website. Which of the following tools did Taylor employ in the above scenario?

    A. WebSite Watcher

    B. web-Stat

    C. Webroot

    D. WAFW00F

  • Question 217:

    To create a botnet, the attacker can use several techniques to scan vulnerable machines. The attacker first collects information about a large number of vulnerable machines to create a list. Subsequently, they infect the machines. The list is

    divided by assigning half of the list to the newly compromised machines. The scanning process runs simultaneously. This technique ensures the spreading and installation of malicious code in little time.

    Which technique is discussed here?

    A. Hit-list-scanning technique

    B. Topological scanning technique

    C. Subnet scanning technique

    D. Permutation scanning technique

  • Question 218:

    After an audit, the auditors inform you that there is a critical finding that you must tackle immediately. You read the audit report, and the problem is the service running on port 369. Which service is this and how can you tackle the problem?

    A. The service is LDAP. and you must change it to 636. which is LDPAPS.

    B. The service is NTP. and you have to change It from UDP to TCP in order to encrypt it

    C. The findings do not require immediate actions and are only suggestions.

    D. The service is SMTP, and you must change it to SMIME. which is an encrypted way to send emails.

  • Question 219:

    Jane invites her friends Alice and John over for a LAN party. Alice and John access Jane's wireless network without a password. However, Jane has a long, complex password on her router. What attack has likely occurred?

    A. Wireless sniffing

    B. Piggybacking

    C. Evil twin

    D. Wardriving

  • Question 220:

    In an attempt to damage the reputation of a competitor organization, Hailey, a professional hacker, gathers a list of employee and client email addresses and other related information by using various search engines, social networking sites,

    and web spidering tools. In this process, she also uses an automated tool to gather a list of words from the target website to further perform a brute-force attack on the previously gathered email addresses.

    What is the tool used by Hailey for gathering a list of words from the target website?

    A. Shadowsocks

    B. CeWL

    C. Psiphon

    D. Orbot

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.