Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :May 26, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 351:

    Which of the following describes the characteristics of a Boot Sector Virus?

    A. Modifies directory table entries so that directory entries point to the virus code instead of the actual program.

    B. Moves the MBR to another location on the RAM and copies itself to the original location of the MBR.

    C. Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR.

    D. Overwrites the original MBR and only executes the new virus code.

  • Question 352:

    An attacker redirects the victim to malicious websites by sending them a malicious link by email. The link appears authentic but redirects the victim to a malicious web page, which allows the attacker to steal the victim's data. What type of attack is this?

    A. Phishing

    B. Vlishing

    C. Spoofing

    D. DDoS

  • Question 353:

    DNS cache snooping is a process of determining if the specified resource address is present in the DNS cache records. It may be useful during the examination of the network to determine what software update resources are used, thus

    discovering what software is installed.

    What command is used to determine if the entry is present in DNS cache?

    A. nslookup -fullrecursive update.antivirus.com

    B. dnsnooping -rt update.antivirus.com

    C. nslookup -norecursive update.antivirus.com

    D. dns --snoop update.antivirus.com

  • Question 354:

    Null sessions are un-authenticated connections (not using a username or password.) to an NT or 2000 system. Which TCP and UDP ports must you filter to check null sessions on your network?

    A. 137 and 139

    B. 137 and 443

    C. 139 and 443

    D. 139 and 445

  • Question 355:

    What is a "Collision attack" in cryptography?

    A. Collision attacks try to get the public key

    B. Collision attacks try to break the hash into three parts to get the plaintext value

    C. Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key

    D. Collision attacks try to find two inputs producing the same hash

  • Question 356:

    Lewis, a professional hacker, targeted the loT cameras and devices used by a target venture-capital firm. He used an information-gathering tool to collect information about the loT devices connected to a network, open ports and services, and the attack surface area. Using this tool, he also generated statistical reports on broad usage patterns and trends. This tool helped Lewis continually monitor every reachable server and device on the Internet, further allowing him to exploit these devices in the network. Which of the following tools was employed by Lewis in the above scenario?

    A. Censys

    B. Wapiti

    C. NeuVector

    D. Lacework

  • Question 357:

    Kevin, an encryption specialist, implemented a technique that enhances the security of keys used for encryption and authentication. Using this technique, Kevin input an initial key to an algorithm that generated an enhanced key that is resistant to brute-force attacks. What is the technique employed by Kevin to improve the security of encryption keys?

    A. Key derivation function

    B. Key reinstallation

    C. A Public key infrastructure

    D. Key stretching

  • Question 358:

    What kind of detection techniques is being used in antivirus software that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it's made on the provider's environment?

    A. Behavioral based

    B. Heuristics based

    C. Honeypot based

    D. Cloud based

  • Question 359:

    While testing a web application in development, you notice that the web server does not properly ignore the "dot dot slash" (../) character string and instead returns the file listing of a folder structure of the server. What kind of attack is possible in this scenario?

    A. Cross-site scripting

    B. Denial of service

    C. SQL injection

    D. Directory traversal

  • Question 360:

    Cross-site request forgery involves:

    A. A request sent by a malicious user from a browser to a server

    B. Modification of a request by a proxy between client and server

    C. A browser making a request to a server without the user's knowledge

    D. A server making a request to another server without the user's knowledge

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.