Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :Jun 04, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 371:

    Miley, a professional hacker, decided to attack a target organization's network. To perform the attack, she used a tool to send fake ARP messages over the target network to link her MAC address with the target system's IP address. By performing this, Miley received messages directed to the victim's MAC address and further used the tool to intercept, steal, modify, and block sensitive communication to the target system. What is the tool employed by Miley to perform the above attack?

    A. Gobbler

    B. KDerpNSpoof

    C. BetterCAP

    D. Wireshark

  • Question 372:

    An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", the user is directed to a phishing site. Which file does the attacker need to modify?

    A. Boot.ini

    B. Sudoers

    C. Networks

    D. Hosts

  • Question 373:

    You have successfully logged on a Linux system. You want to now cover your trade. Your login attempt may be logged on several files located in /var/log. Which file does NOT belongs to the list:

    A. user.log

    B. auth.fesg

    C. wtmp

    D. btmp

  • Question 374:

    Given below are different steps involved in the vulnerability-management life cycle.

    1) Remediation 2) Identify assets and create a baseline 3) Verification 4) Monitor 5) Vulnerability scan 6) Risk assessment

    Identify the correct sequence of steps involved in vulnerability management.

    A. 2-->5-->6-->1-->3-->4

    B. 2-->1-->5-->6-->4-->3

    C. 2-->4-->5-->3-->6--> 1

    D. 1-->2-->3-->4-->5-->6

  • Question 375:

    Todd has been asked by the security officer to purchase a counter-based authentication system. Which of the following best describes this type of system?

    A. A biometric system that bases authentication decisions on behavioral attributes.

    B. A biometric system that bases authentication decisions on physical attributes.

    C. An authentication system that creates one-time passwords that are encrypted with secret keys.

    D. An authentication system that uses passphrases that are converted into virtual passwords.

  • Question 376:

    Which Intrusion Detection System is the best applicable for large environments where critical assets on the network need extra scrutiny and is ideal for observing sensitive network segments?

    A. Honeypots

    B. Firewalls

    C. Network-based intrusion detection system (NIDS)

    D. Host-based intrusion detection system (HIDS)

  • Question 377:

    An attacker scans a host with the below command. Which three flags are set?

    # nmap -sX host.domain.com

    A. This is SYN scan. SYN flag is set.

    B. This is Xmas scan. URG, PUSH and FIN are set.

    C. This is ACK scan. ACK flag is set.

    D. This is Xmas scan. SYN and ACK flags are set.

  • Question 378:

    Session splicing is an IDS evasion technique in which an attacker delivers data in multiple, small sized packets to the target computer, making it very difficult for an IDS to detect the attack signatures. Which tool can be used to perform session splicing attacks?

    A. tcpsplice

    B. Burp

    C. Hydra

    D. Whisker

  • Question 379:

    While performing an Nmap scan against a host, Paola determines the existence of a firewall. In an attempt to determine whether the firewall is stateful or stateless, which of the following options would be best to use?

    A. -sA

    B. -sX

    C. -sT

    D. -sF

  • Question 380:

    John the Ripper is a technical assessment tool used to test the weakness of which of the following?

    A. Passwords

    B. File permissions

    C. Firewall rulesets

    D. Usernames

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.