Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

312-50v12 Certified Ethical Hacker Exam (CEHv12) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

312-50v12 Practice Questions

Certified Ethical Hacker Exam (CEHv12)

Last Update 4 days ago
Total Questions : 572

Dive into our fully updated and stable 312-50v12 practice test platform, featuring all the latest CEH v12 exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free CEH v12 practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 312-50v12. Use this test to pinpoint which areas you need to focus your study on.

312-50v12 PDF

312-50v12 PDF (Printable)
$43.75
$124.99

312-50v12 Testing Engine

312-50v12 PDF (Printable)
$50.75
$144.99

312-50v12 PDF + Testing Engine

312-50v12 PDF (Printable)
$63.7
$181.99
Question # 136

Which of the following tools can be used to perform a zone transfer?

Options:

A.  

NSLookup

B.  

Finger

C.  

Dig

D.  

Sam Spade

E.  

Host

F.  

Netcat

G.  

Neotrace

Discussion 0
Question # 137

A network admin contacts you. He is concerned that ARP spoofing or poisoning might occur on his network. What are some things he can do to prevent it? Select the best answers.

Options:

A.  

Use port security on his switches.

B.  

Use a tool like ARPwatch to monitor for strange ARP activity.

C.  

Use a firewall between all LAN segments.

D.  

If you have a small network, use static ARP entries.

E.  

Use only static IP addresses on all PC's.

Discussion 0
Question # 138

Bob received this text message on his mobile phone: “Hello, this is Scott Smelby from the Yahoo Bank. Kindly contact me for a vital transaction on: scottsmelby@yahoo.com”. Which statement below is true?

Options:

A.  

This is a scam as everybody can get a @yahoo address, not the Yahoo customer service employees.

B.  

This is a scam because Bob does not know Scott.

C.  

Bob should write to scottmelby@yahoo.com to verify the identity of Scott.

D.  

This is probably a legitimate message as it comes from a respectable organization.

Discussion 0
Question # 139

Study the following log extract and identify the attack.

Question # 139

Options:

A.  

Hexcode Attack

B.  

Cross Site Scripting

C.  

Multiple Domain Traversal Attack

D.  

Unicode Directory Traversal Attack

Discussion 0
Question # 140

To determine if a software program properly handles a wide range of invalid input, a form of automated testing can be used to randomly generate invalid input in an attempt to crash the program.

What term is commonly used when referring to this type of testing?

Options:

A.  

Randomizing

B.  

Bounding

C.  

Mutating

D.  

Fuzzing

Discussion 0
Question # 141

Email is transmitted across the Internet using the Simple Mail Transport Protocol. SMTP does not encrypt email, leaving the information in the message vulnerable to being read by an unauthorized person. SMTP can upgrade a connection between two mail servers to use TLS. Email transmitted by SMTP over TLS is encrypted. What is the name of the command used by SMTP to transmit email over TLS?

Options:

A.  

OPPORTUNISTICTLS

B.  

UPGRADETLS

C.  

FORCETLS

D.  

STARTTLS

Discussion 0
Question # 142

A user on your Windows 2000 network has discovered that he can use L0phtcrack to sniff the SMB exchanges which carry user logons. The user is plugged into a hub with 23 other systems.

However, he is unable to capture any logons though he knows that other users are logging in.

What do you think is the most likely reason behind this?

Options:

A.  

There is a NIDS present on that segment.

B.  

Kerberos is preventing it.

C.  

Windows logons cannot be sniffed.

D.  

L0phtcrack only sniffs logons to web servers.

Discussion 0
Question # 143

An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections.

When users accessed any page, the applet ran and exploited many machines. Which one of the following tools the hacker probably used to inject HTML code?

Options:

A.  

Wireshark

B.  

Ettercap

C.  

Aircrack-ng

D.  

Tcpdump

Discussion 0
Question # 144

Which of the following is the BEST way to defend against network sniffing?

Options:

A.  

Using encryption protocols to secure network communications

B.  

Register all machines MAC Address in a Centralized Database

C.  

Use Static IP Address

D.  

Restrict Physical Access to Server Rooms hosting Critical Servers

Discussion 0
Question # 145

What is correct about digital signatures?

Options:

A.  

A digital signature cannot be moved from one signed document to another because it is the hash of the original document encrypted with the private key of the signing party.

B.  

Digital signatures may be used in different documents of the same type.

C.  

A digital signature cannot be moved from one signed document to another because it is a plain hash of the document content.

D.  

Digital signatures are issued once for each user and can be used everywhere until they expire.

Discussion 0
Question # 146

The company ABC recently contracts a new accountant. The accountant will be working with the financial statements. Those financial statements need to be approved by the CFO and then they will be sent to the accountant but the CFO is worried because he wants to be sure that the information sent to the accountant was not modified once he approved it. Which of the following options can be useful to ensure the integrity of the data?

Options:

A.  

The CFO can use a hash algorithm in the document once he approved the financial statements

B.  

The CFO can use an excel file with a password

C.  

The financial statements can be sent twice, one by email and the other delivered in USB and the accountant can compare both to be sure is the same document

D.  

The document can be sent to the accountant using an exclusive USB for that document

Discussion 0
Question # 147

Which method of password cracking takes the most time and effort?

Options:

A.  

Dictionary attack

B.  

Shoulder surfing

C.  

Rainbow tables

D.  

Brute force

Discussion 0
Question # 148

What tool can crack Windows SMB passwords simply by listening to network traffic?

Options:

A.  

This is not possible

B.  

Netbus

C.  

NTFSDOS

D.  

L0phtcrack

Discussion 0
Question # 149

What is a “Collision attack” in cryptography?

Options:

A.  

Collision attacks try to get the public key

B.  

Collision attacks try to break the hash into three parts to get the plaintext value

C.  

Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key

D.  

Collision attacks try to find two inputs producing the same hash

Discussion 0
Question # 150

Which of the following is a low-tech way of gaining unauthorized access to systems?

Options:

A.  

Social Engineering

B.  

Eavesdropping

C.  

Scanning

D.  

Sniffing

Discussion 0
Get 312-50v12 dumps and pass your exam in 24 hours!

Free Exams Sample Questions