Exam Details

  • Exam Code
    :312-50V12
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v12)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :596 Q&As
  • Last Updated
    :May 18, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V12 Questions & Answers

  • Question 571:

    You have gained physical access to a Windows 2008 R2 server which has an accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your toolkit, you have an Ubuntu 9.10 Linux LiveCD. Which Linux-based tool can change any user's password or activate disabled Windows accounts?

    A. John the Ripper

    B. SET

    C. CHNTPW

    D. Cain and Abel

  • Question 572:

    An organization decided to harden its security against web-application and web-server attacks. John, a security personnel in the organization, employed a security scanner to automate web-application security testing and to guard the organization's web infrastructure against web-application threats. Using that tool, he also wants to detect XSS, directory transversal problems, fault injection, SQL injection, attempts to execute commands, and several other attacks. Which of the following security scanners will help John perform the above task?

    A. AlienVault OSSIM

    B. Syhunt Hybrid

    C. Saleae Logic Analyzer

    D. Cisco ASA

  • Question 573:

    You are analysing traffic on the network with Wireshark. You want to routinely run a cron job which will run the capture against a specific set of IPs, "192.168.8.0/24". What command you would use?

    A. wireshark ""fetch "192.168.8/*"

    B. wireshark ""capture ""local ""masked 192.168.8.0 ""range 24

    C. tshark "net 192.255.255.255 mask 192.168.8.0"

    D. sudo tshark -f "net 192.168.8.0/24"

  • Question 574:

    What is the file that determines the basic configuration (specifically activities, services, broadcast receivers, etc.) in an Android application?

    A. AndroidManifest.xml

    B. APK.info

    C. resources.asrc

    D. classes.dex

  • Question 575:

    Gerard, a disgruntled ex-employee of Sunglass IT Solutions, targets this organization to perform sophisticated attacks and bring down its reputation in the market. To launch the attacks process, he performed DNS footprinting to gather information about ONS servers and to identify the hosts connected in the target network. He used an automated tool that can retrieve information about DNS zone data including DNS domain names, computer names. IP addresses. DNS records, and network WHOIS records. He further exploited this information to launch other sophisticated attacks. What is the tool employed by Gerard in the above scenario?

    A. Knative

    B. zANTI

    C. Towelroot

    D. Bluto

  • Question 576:

    Morris, an attacker, wanted to check whether the target AP is in a locked state. He attempted using different utilities to identify WPS-enabled APs in the target wireless network. Ultimately, he succeeded with one special command-line utility. Which of the following command-line utilities allowed Morris to discover the WPS-enabled APs?

    A. wash

    B. ntptrace

    C. macof

    D. net View

  • Question 577:

    Email scams and mail fraud are regulated by which of the following?

    A. 18 U.S.C. par. 1030 Fraud and Related activity in connection with Computers

    B. 18 U.S.C. par. 1029 Fraud and Related activity in connection with Access Devices

    C. 18 U.S.C. par. 1362 Communication Lines, Stations, or Systems

    D. 18 U.S.C. par. 2510 Wire and Electronic Communications Interception and Interception of Oral Communication

  • Question 578:

    Jane, an ethical hacker, is testing a target organization's web server and website to identity security loopholes. In this process, she copied the entire website and its content on a local drive to view the complete profile of the site's directory structure, file structure, external links, images, web pages, and so on. This information helps Jane map the website's directories and gain valuable information. What is the attack technique employed by Jane in the above scenario?

    A. website mirroring

    B. Session hijacking

    C. Web cache poisoning

    D. Website defacement

  • Question 579:

    If you want to only scan fewer ports than the default scan using Nmap tool, which option would you use?

    A. -r

    B. -F

    C. -P

    D. -sP

  • Question 580:

    While examining audit logs, you discover that people are able to telnet into the SMTP server on port 25. You would like to block this, though you do not see any evidence of an attack or other wrong doing. However, you are concerned about affecting the normal functionality of the email server. From the following options choose how best you can achieve this objective?

    A. Block port 25 at the firewall.

    B. Shut off the SMTP service on the server.

    C. Force all connections to use a username and password.

    D. Switch from Windows Exchange to UNIX Sendmail.

    E. None of the above.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V12 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.