Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :May 26, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 291:

    Attacker Simon targeted the communication network of an organization and disabled the security controls of NetNTLMvl by modifying the values of LMCompatibilityLevel, NTLMMinClientSec, and RestrictSendingNTLMTraffic. He then extracted all the non- network logon tokens from all the active processes to masquerade as a legitimate user to launch further attacks. What is the type of attack performed by Simon?

    A. Internal monologue attack

    B. Combinator attack

    C. Rainbow table attack

    D. Dictionary attack

  • Question 292:

    Jacob works as a system administrator in an organization. He wants to extract the source code of a mobile application and disassemble the application to analyze its design flaws. Using this technique, he wants to fix any bugs in the

    application, discover underlying vulnerabilities, and improve defense strategies against attacks.

    What is the technique used by Jacob in the above scenario to improve the security of the mobile application?

    A. Reverse engineering

    B. App sandboxing

    C. Jailbreaking

    D. Social engineering

  • Question 293:

    A group of hackers were roaming around a bank office building in a city, driving a luxury car. They were using hacking tools on their laptop with the intention to find a free-access wireless network. What is this hacking process known as?

    A. GPS mapping

    B. Spectrum analysis

    C. Wardriving

    D. Wireless sniffing

  • Question 294:

    env x='(){ :;};echo exploit' bash -c `cat/etc/passwd' What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?

    A. Removes the passwd file

    B. Changes all passwords in passwd

    C. Add new user to the passwd file

    D. Display passwd content to prompt

  • Question 295:

    The network in ABC company is using the network address 192.168.1.64 with mask 255.255.255.192. In the network the servers are in the addresses 192.168.1.122, 192.168.1.123 and 192.168.1.124. An attacker is trying to find those servers but he cannot see them in his scanning. The command he is using is: nmap 192.168.1.64/28.

    Why he cannot see the servers?

    A. He needs to add the command ""ip address"" just before the IP address

    B. He needs to change the address to 192.168.1.0 with the same mask

    C. He is scanning from 192.168.1.64 to 192.168.1.78 because of the mask /28 and the servers are not in that range

    D. The network must be dawn and the nmap command and IP address are ok

  • Question 296:

    What is the least important information when you analyze a public IP address in a security alert?

    A. DNS

    B. Whois

    C. Geolocation

    D. ARP

  • Question 297:

    While using your bank's online servicing you notice the following string in the URL bar:

    "http: // www. MyPersonalBank.com/account?id=368940911028389andDamount=10980andCamount=21"

    You observe that if you modify the Damount and Camount values and submit the request, that data on the web page reflects the changes.

    Which type of vulnerability is present on this site?

    A. Cookie Tampering

    B. SQL Injection

    C. Web Parameter Tampering

    D. XSS Reflection

  • Question 298:

    Bob, an attacker, has managed to access a target loT device. He employed an online tool to gather information related to the model of the loT device and the certifications granted to it. Which of the following tools did Bob employ to gather the above information?

    A. search.com

    B. EarthExplorer

    C. Google image search

    D. FCC ID search

  • Question 299:

    Tony wants to integrate a 128-bit symmetric block cipher with key sizes of 128,192, or 256 bits into a software program, which involves 32 rounds of computational operations that include substitution and permutation operations on four 32-bit word blocks using 8-variable S-boxes with 4-bit entry and 4-bit exit. Which of the following algorithms includes all the above features and can be integrated by Tony into the software program?

    A. TEA

    B. CAST-128

    C. RC5

    D. serpent

  • Question 300:

    As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing. What document describes the specifics of the testing, the associated violations, and essentially protects both the organization's interest and your liabilities as a tester?

    A. Service Level Agreement

    B. Project Scope

    C. Rules of Engagement

    D. Non-Disclosure Agreement

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.