Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 241:

    Which of the following protocols can be used to secure an LDAP service against anonymous queries?

    A. SSO

    B. RADIUS

    C. WPA

    D. NTLM

  • Question 242:

    ping-* 6 192.168.0.101

    Output:

    Pinging 192.168.0.101 with 32 bytes of data:

    Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

    Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

    Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

    Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

    Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

    Reply from 192.168.0.101:

    Ping statistics for 192.168.0101

    Packets: Sent = 6, Received = 6, Lost = 0 (0% loss).

    Approximate round trip times in milli-seconds:

    Minimum = 0ms, Maximum = 0ms, Average = 0ms

    What does the option * indicate?

    A. t

    B. s

    C. a

    D. n

  • Question 243:

    What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?

    A. Residual risk

    B. Impact risk

    C. Deferred risk

    D. Inherent risk

  • Question 244:

    Jude, a pen tester, examined a network from a hacker's perspective to identify exploits and vulnerabilities accessible to the outside world by using devices such as firewalls, routers, and servers. In this process, he also estimated the threat of

    network security attacks and determined the level of security of the corporate network.

    What is the type of vulnerability assessment that Jude performed on the organization?

    A. External assessment

    B. Passive assessment

    C. Host-based assessment

    D. Application assessment

  • Question 245:

    CompanyXYZ has asked you to assess the security of their perimeter email gateway. From your office in New York, you craft a specially formatted email message and send it across the Internet to an employee of CompanyXYZ. The

    employee of CompanyXYZ is aware of your test. Your email message looks like this:

    From: [email protected]

    To: [email protected] Subject: Test message

    Date: 4/3/2017 14:37

    The employee of CompanyXYZ receives your email message.

    This proves that CompanyXYZ's email gateway doesn't prevent what?

    A. Email Masquerading

    B. Email Harvesting

    C. Email Phishing

    D. Email Spoofing

  • Question 246:

    Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations.

    Bob also concluded that DMZ makes sense just when a stateful firewall is available, which is not the case of TPNQM SA.

    In this context, what can you say?

    A. Bob can be right since DMZ does not make sense when combined with stateless firewalls

    B. Bob is partially right. He does not need to separate networks if he can create rules by destination IPs, one by one

    C. Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations

    D. Bob is partially right. DMZ does not make sense when a stateless firewall is available

  • Question 247:

    Bill is a network administrator. He wants to eliminate unencrypted traffic inside his company's network. He decides to setup a SPAN port and capture all traffic to the datacenter. He immediately discovers unencrypted traffic in port UDP 161. What protocol is this port using and how can he secure that traffic?

    A. it is not necessary to perform any actions, as SNMP is not carrying important information.

    B. SNMP and he should change it to SNMP V3

    C. RPC and the best practice is to disable RPC completely

    D. SNMP and he should change it to SNMP v2, which is encrypted

  • Question 248:

    John is investigating web-application firewall logs and observers that someone is attempting to inject the following:

    char buff[10]; buff[>o] - 'a':

    What type of attack is this?

    A. CSRF

    B. XSS

    C. Buffer overflow

    D. SQL injection

  • Question 249:

    Elliot is in the process of exploiting a web application that uses SQL as a back-end database. He's determined that the application is vulnerable to SQL injection, and has introduced conditional timing delays into injected queries to determine

    whether they are successful.

    What type of SQL injection is Elliot most likely performing?

    A. Error-based SQL injection

    B. Blind SQL injection

    C. Union-based SQL injection

    D. NoSQL injection

  • Question 250:

    Alice, a professional hacker, targeted an organization's cloud services. She infiltrated the targets MSP provider by sending spear-phishing emails and distributed custom-made malware to compromise user accounts and gain remote access to the cloud service. Further, she accessed the target customer profiles with her MSP account, compressed the customer data, and stored them in the MSP. Then, she used this information to launch further attacks on the target organization. Which of the following cloud attacks did Alice perform in the above scenario?

    A. Cloud hopper attack

    B. Cloud cryptojacking

    C. Cloudborne attack

    D. Man-in-the-cloud (MITC) attack

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.