Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :May 26, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 301:

    At what stage of the cyber kill chain theory model does data exfiltration occur?

    A. Actions on objectives

    B. Weaponization

    C. installation

    D. Command and control

  • Question 302:

    What is the minimum number of network connections in a multihomed firewall?

    A. 3

    B. 5

    C. 4

    D. 2

  • Question 303:

    The Heartbleed bug was discovered in 2014 and is widely referred to under MITRE's Common Vulnerabilities and Exposures (CVE) as CVE-2014-0160. This bug affects the OpenSSL implementation of the Transport Layer Security (TLS)

    protocols defined in RFC6520.

    What type of key does this bug leave exposed to the Internet making exploitation of any compromised system very easy?

    A. Public

    B. Private

    C. Shared

    D. Root

  • Question 304:

    #!/usr/bin/python import socket buffer=[""A""] counter=50 while len(buffer)<=100: buffer.append (""A""*counter)

    counter=counter+50 commands= [""HELP"",""STATS ."",""RTIME ."",""LTIME. "",""SRUN ."',""TRUN ."",""GMON."",""GDOG ."",""KSTET .",""GTER ."",""HTER ."", ""LTER .",""KSTAN .""] for command in commands: for buffstring in buffer: print ""Exploiting"" +command +"":""+str(len(buffstring)) s=socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect((`127.0.0.1', 9999)) s.recv(50) send(command+buffstring) s.close()

    What is the code written for?

    A. Denial-of-service (DOS)

    B. Buffer Overflow

    C. Bruteforce

    D. Encryption

  • Question 305:

    Some clients of TPNQM SA were redirected to a malicious site when they tried to access the TPNQM main site. Bob, a system administrator at TPNQM SA, found that they were victims of DNS Cache Poisoning. What should Bob recommend to deal with such a threat?

    A. The use of security agents in clients' computers

    B. The use of DNSSEC

    C. The use of double-factor authentication

    D. Client awareness

  • Question 306:

    You have compromised a server on a network and successfully opened a shell. You aimed to identify all operating systems running on the network. However, as you attempt to fingerprint all machines in the network using the nmap syntax

    below, it is not going through.

    invictus@victim_server.~$ nmap -T4 -O 10.10.0.0/24 TCP/IP fingerprinting (for OS scan) xxxxxxx xxxxxx xxxxxxxxx. QUITTING!

    What seems to be wrong?

    A. The nmap syntax is wrong.

    B. This is a common behavior for a corrupted nmap application.

    C. The outgoing TCP/IP fingerprinting is blocked by the host firewall.

    D. OS Scan requires root privileges.

  • Question 307:

    Which utility will tell you in real time which ports are listening or in another state?

    A. Netstat

    B. TCPView

    C. Nmap

    D. Loki

  • Question 308:

    Harry, a professional hacker, targets the IT infrastructure of an organization. After preparing for the attack, he attempts to enter the target network using techniques such as sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. Using these techniques, he successfully deployed malware on the target system to establish an outbound connection. What is the APT lifecycle phase that Harry is currently executing?

    A. Preparation

    B. Cleanup

    C. Persistence

    D. initial intrusion

  • Question 309:

    A company's Web development team has become aware of a certain type of security vulnerability in their Web software. To mitigate the possibility of this vulnerability being exploited, the team wants to modify the software requirements to disallow users from entering HTML as input into their Web application.

    What kind of Web application vulnerability likely exists in their software?

    A. Cross-site scripting vulnerability

    B. SQL injection vulnerability

    C. Web site defacement vulnerability

    D. Gross-site Request Forgery vulnerability

  • Question 310:

    Ben purchased a new smartphone and received some updates on it through the OTA method. He received two messages: one with a PIN from the network operator and another asking him to enter the PIN received from the operator. As soon as he entered the PIN, the smartphone started functioning in an abnormal manner. What is the type of attack performed on Ben in the above scenario?

    A. Advanced SMS phishing

    B. Bypass SSL pinning

    C. Phishing

    D. Tap 'n ghost attack

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.