Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :May 26, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 311:

    You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible. But they are not accessible when you try using the URL. What may be the problem?

    A. Traffic is Blocked on UDP Port 53

    B. Traffic is Blocked on TCP Port 80

    C. Traffic is Blocked on TCP Port 54

    D. Traffic is Blocked on UDP Port 80

  • Question 312:

    Jack, a professional hacker, targets an organization and performs vulnerability scanning on the target web server to identify any possible weaknesses, vulnerabilities, and misconfigurations. In this process, Jack uses an automated tool that eases his work and performs vulnerability scanning to find hosts, services, and other vulnerabilities in the target server. Which of the following tools is used by Jack to perform vulnerability scanning?

    A. Infoga

    B. WebCopier Pro

    C. Netsparker

    D. NCollector Studio

  • Question 313:

    "........is an attack type for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications. It is the wireless version of the phishing scam. An

    attacker fools wireless users into connecting a laptop or mobile phone to a tainted hot-spot by posing as a legitimate provider. This type of attack may be used to steal the passwords of unsuspecting users by either snooping the

    communication link or by phishing, which involves setting up a fraudulent web site and luring people there."

    Fill in the blank with appropriate choice.

    A. Evil Twin Attack

    B. Sinkhole Attack

    C. Collision Attack

    D. Signal Jamming Attack

  • Question 314:

    How is the public key distributed in an orderly, controlled fashion so that the users can be sure of the sender's identity?

    A. Hash value

    B. Private key

    C. Digital signature

    D. Digital certificate

  • Question 315:

    Shiela is an information security analyst working at HiTech Security Solutions. She is performing service version discovery using Nmap to obtain information about the running services and their versions on a target system. Which of the following Nmap options must she use to perform service version discovery on the target host?

    A. -SN

    B. -SX

    C. -sV

    D. -SF

  • Question 316:

    These hackers have limited or no training and know how to use only basic techniques or tools. What kind of hackers are we talking about?

    A. Black-Hat Hackers A

    B. Script Kiddies

    C. White-Hat Hackers

    D. Gray-Hat Hacker

  • Question 317:

    A security analyst uses Zenmap to perform an ICMP timestamp ping scan to acquire information related to the current time from the target host machine. Which of the following Zenmap options must the analyst use to perform the ICMP timestamp ping scan?

    A. -PY

    B. -PU

    C. -PP

    D. -Pn

  • Question 318:

    Which of the following LM hashes represent a password of less than 8 characters? (Choose two.)

    A. BA810DBA98995F1817306D272A9441BB

    B. 44EFCE164AB921CQAAD3B435B51404EE

    C. 0182BD0BD4444BF836077A718CCDF409

    D. CEC52EB9C8E3455DC2265B23734E0DAC

    E. B757BF5C0D87772FAAD3B435B51404EE

    F. E52CAC67419A9A224A3B108F3FA6CB6D

  • Question 319:

    A friend of yours tells you that he downloaded and executed a file that was sent to him by a coworker. Since the file did nothing when executed, he asks you for help because he suspects that he may have installed a trojan on his computer. What tests would you perform to determine whether his computer Is Infected?

    A. Use ExifTool and check for malicious content.

    B. You do not check; rather, you immediately restore a previous snapshot of the operating system.

    C. Upload the file to VirusTotal.

    D. Use netstat and check for outgoing connections to strange IP addresses or domains.

  • Question 320:

    Matthew, a black hat, has managed to open a meterpreter session to one of the kiosk machines in Evil Corp's lobby. He checks his current SID, which is S-1-5-21-1223352397- 1872883824-861252104-501. What needs to happen before Matthew has full administrator access?

    A. He must perform privilege escalation.

    B. He needs to disable antivirus protection.

    C. He needs to gain physical access.

    D. He already has admin privileges, as shown by the "501" at the end of the SID.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.