Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

312-50v12 Certified Ethical Hacker Exam (CEHv12) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

312-50v12 Practice Questions

Certified Ethical Hacker Exam (CEHv12)

Last Update 1 hour ago
Total Questions : 572

Dive into our fully updated and stable 312-50v12 practice test platform, featuring all the latest CEH v12 exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free CEH v12 practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 312-50v12. Use this test to pinpoint which areas you need to focus your study on.

312-50v12 PDF

312-50v12 PDF (Printable)
$43.75
$124.99

312-50v12 Testing Engine

312-50v12 PDF (Printable)
$50.75
$144.99

312-50v12 PDF + Testing Engine

312-50v12 PDF (Printable)
$63.7
$181.99
Question # 151

The collection of potentially actionable, overt, and publicly available information is known as

Options:

A.  

Open-source intelligence

B.  

Real intelligence

C.  

Social intelligence

D.  

Human intelligence

Discussion 0
Question # 152

Shellshock allowed an unauthorized user to gain access to a server. It affected many Internet-facing services, which OS did it not directly affect?

Options:

A.  

Linux

B.  

Unix

C.  

OS X

D.  

Windows

Discussion 0
Question # 153

Study the snort rule given below:

Question # 153

From the options below, choose the exploit against which this rule applies.

Options:

A.  

WebDav

B.  

SQL Slammer

C.  

MS Blaster

D.  

MyDoom

Discussion 0
Question # 154

You have gained physical access to a Windows 2008 R2 server which has an accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your toolkit, you have an Ubuntu 9.10 Linux LiveC

D.  

Which Linux-based tool can change any user’s password or activate disabled Windows accounts?

Options:

A.  

John the Ripper

B.  

SET

C.  

CHNTPW

D.  

Cain & Abel

Discussion 0
Question # 155

A company’s policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department. Using Wireshark to examine the captured traffic, which command can be used as display filter to find unencrypted file transfers?

Options:

A.  

tcp.port = = 21

B.  

tcp.port = 23

C.  

tcp.port = = 21 | | tcp.port = =22

D.  

tcp.port ! = 21

Discussion 0
Question # 156

What two conditions must a digital signature meet?

Options:

A.  

Has to be the same number of characters as a physical signature and must be unique.

B.  

Has to be unforgeable, and has to be authentic.

C.  

Must be unique and have special characters.

D.  

Has to be legible and neat.

Discussion 0
Question # 157

Which address translation scheme would allow a single public IP address to always correspond to a single machine on an internal network, allowing "server publishing"?

Options:

A.  

Overloading Port Address Translation

B.  

Dynamic Port Address Translation

C.  

Dynamic Network Address Translation

D.  

Static Network Address Translation

Discussion 0
Question # 158

Which DNS resource record can indicate how long any "DNS poisoning" could last?

Options:

A.  

MX

B.  

SOA

C.  

NS

D.  

TIMEOUT

Discussion 0
Question # 159

Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access.

A camera captures people walking and identifies the individuals using Steve’s approach.

After that, people must approximate their RFID badges. Both the identifications are required to open the door. In this case, we can say:

Options:

A.  

Although the approach has two phases, it actually implements just one authentication factor

B.  

The solution implements the two authentication factors: physical object and physical characteristic

C.  

The solution will have a high level of false positives

D.  

Biological motion cannot be used to identify people

Discussion 0
Question # 160

You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration? alert tcp any any -> 192.168.100.0/24 21 (msg: ““FTP on the network!””;)

Options:

A.  

A firewall IPTable

B.  

FTP Server rule

C.  

A Router IPTable

D.  

An Intrusion Detection System

Discussion 0
Question # 161

Peter extracts the SIDs list from Windows 2000 Server machine using the hacking tool "SIDExtractor". Here is the output of the SIDs:

Question # 161

From the above list identify the user account with System Administrator privileges.

Options:

A.  

John

B.  

Rebecca

C.  

Sheela

D.  

Shawn

E.  

Somia

F.  

Chang

G.  

Micah

Discussion 0
Question # 162

Session splicing is an IDS evasion technique in which an attacker delivers data in multiple, small sized packets to the target computer, making it very difficult for an IDS to detect the attack signatures. Which tool can be used to perform session splicing attacks?

Options:

A.  

tcpsplice

B.  

Burp

C.  

Hydra

D.  

Whisker

Discussion 0
Question # 163

“........is an attack type for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications. It is the wireless version of the phishing scam. An attacker fools wireless users into connecting a laptop or mobile phone to a tainted hot-spot by posing as a legitimate provider. This type of attack may be used to steal the passwords of

unsuspecting users by either snooping the communication link or by phishing, which involves setting up a fraudulent web site and luring people there.”

Fill in the blank with appropriate choice.

Options:

A.  

Evil Twin Attack

B.  

Sinkhole Attack

C.  

Collision Attack

D.  

Signal Jamming Attack

Discussion 0
Question # 164

Susan has attached to her company's network. She has managed to synchronize her boss's sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory.

What kind of attack is Susan carrying on?

Options:

A.  

A sniffing attack

B.  

A spoofing attack

C.  

A man in the middle attack

D.  

A denial of service attack

Discussion 0
Question # 165

A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the Prometric Online Testing – Reports https://ibt1.prometric.com/users/custom/report_queue/rq_str... corporate network. What tool should the analyst use to perform a Blackjacking attack?

Options:

A.  

Paros Proxy

B.  

BBProxy

C.  

Blooover

D.  

BBCrack

Discussion 0
Get 312-50v12 dumps and pass your exam in 24 hours!

Free Exams Sample Questions