Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :May 26, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 261:

    In this attack, a victim receives an e-mail claiming from PayPal stating that their account has been disabled and confirmation is required before activation. The attackers then scam to collect not one but two credit card numbers, ATM PIN

    number and other personal details. Ignorant users usually fall prey to this scam.

    Which of the following statement is incorrect related to this attack?

    A. Do not reply to email messages or popup ads asking for personal or financial information

    B. Do not trust telephone numbers in e-mails or popup ads

    C. Review credit card and bank account statements regularly

    D. Antivirus, anti-spyware, and firewall software can very easily detect these type of attacks

    E. Do not send credit card numbers, and personal or financial information via e-mail

  • Question 262:

    Dorian is sending a digitally signed email to Polly, with which key is Dorian signing this message and how is Poly validating It?

    A. Dorian is signing the message with his public key. and Poly will verify that the message came from Dorian by using Dorian's private key.

    B. Dorian Is signing the message with Polys public key. and Poly will verify that the message came from Dorian by using Dorian's public key.

    C. Dorian is signing the message with his private key. and Poly will verify that the message came from Dorian by using Dorian's public key.

    D. Dorian is signing the message with Polys private key. and Poly will verify mat the message came from Dorian by using Dorian's public key.

  • Question 263:

    Which of the following tools can be used for passive OS fingerprinting?

    A. nmap

    B. tcpdump

    C. tracert

    D. ping

  • Question 264:

    Bob is going to perform an active session hijack against Brownies Inc. He has found a target that allows session oriented connections (Telnet) and performs the sequence prediction on the target operating system. He manages to find an active session due to the high level of traffic on the network. What is Bob supposed to do next?

    A. Take over the session

    B. Reverse sequence prediction

    C. Guess the sequence numbers

    D. Take one of the parties offline

  • Question 265:

    Which IOS jailbreaking technique patches the kernel during the device boot so that it becomes jailbroken after each successive reboot?

    A. Tethered jailbreaking

    B. Semi-tethered jailbreaking

    C. Untethered jailbreaking

    D. Semi-Untethered jailbreaking

  • Question 266:

    When conducting a penetration test, it is crucial to use all means to get all available information about the target network. One of the ways to do that is by sniffing the network. Which of the following cannot be performed by the passive network sniffing?

    A. Identifying operating systems, services, protocols and devices

    B. Modifying and replaying captured network traffic

    C. Collecting unencrypted information about usernames and passwords

    D. Capturing a network traffic for further analysis

  • Question 267:

    Larry, a security professional in an organization, has noticed some abnormalities in the user accounts on a web server. To thwart evolving attacks, he decided to harden the security of the web server by adopting countermeasures to secure

    the accounts on the web server.

    Which of the following countermeasures must Larry implement to secure the user accounts on the web server?

    A. Enable unused default user accounts created during the installation of an OS

    B. Enable all non-interactive accounts that should exist but do not require interactive login

    C. Limit the administrator or toot-level access to the minimum number of users

    D. Retain all unused modules and application extensions

  • Question 268:

    The collection of potentially actionable, overt, and publicly available information is known as

    A. Open-source intelligence

    B. Real intelligence

    C. Social intelligence

    D. Human intelligence

  • Question 269:

    The configuration allows a wired or wireless network interface controller to pass all traffic it receives to the Central Processing Unit (CPU), rather than passing only the frames that the controller is intended to receive. Which of the following is being described?

    A. Multi-cast mode

    B. Promiscuous mode

    C. WEM

    D. Port forwarding

  • Question 270:

    Which of the following tools is used to analyze the files produced by several packet-capture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?

    A. tcptrace

    B. Nessus

    C. OpenVAS

    D. tcptraceroute

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.