Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

312-50v12 Certified Ethical Hacker Exam (CEHv12) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

312-50v12 Practice Questions

Certified Ethical Hacker Exam (CEHv12)

Last Update 4 days ago
Total Questions : 572

Dive into our fully updated and stable 312-50v12 practice test platform, featuring all the latest CEH v12 exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free CEH v12 practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 312-50v12. Use this test to pinpoint which areas you need to focus your study on.

312-50v12 PDF

312-50v12 PDF (Printable)
$43.75
$124.99

312-50v12 Testing Engine

312-50v12 PDF (Printable)
$50.75
$144.99

312-50v12 PDF + Testing Engine

312-50v12 PDF (Printable)
$63.7
$181.99
Question # 31

Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?

Options:

A.  

ACK flag probe scanning

B.  

ICMP Echo scanning

C.  

SYN/FIN scanning using IP fragments

D.  

IPID scanning

Discussion 0
Question # 32

Mike, a security engineer, was recently hired by BigFox Ltd. The company recently experienced disastrous DoS attacks. The management had instructed Mike to build defensive strategies for the company's IT infrastructure to thwart DoS/DDoS attacks. Mike deployed some countermeasures to handle jamming and scrambling attacks. What is the countermeasure Mike applied to defend against jamming and scrambling attacks?

Options:

A.  

Allow the usage of functions such as gets and strcpy

B.  

Allow the transmission of all types of addressed packets at the ISP level

C.  

Implement cognitive radios in the physical layer

D.  

A Disable TCP SYN cookie protection

Discussion 0
Question # 33

Which Nmap switch helps evade IDS or firewalls?

Options:

A.  

-n/-R

B.  

-0N/-0X/-0G

C.  

-T

D.  

-D

Discussion 0
Question # 34

An Internet Service Provider (ISP) has a need to authenticate users connecting via analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network.

Which AAA protocol is the most likely able to handle this requirement?

Options:

A.  

TACACS+

B.  

DIAMETER

C.  

Kerberos

D.  

RADIUS

Discussion 0
Question # 35

Josh has finished scanning a network and has discovered multiple vulnerable services. He knows that several of these usually have protections against external sources but are frequently susceptible to internal users. He decides to draft an email, spoof the sender as the internal IT team, and attach a malicious file disguised as a financial spreadsheet. Before Josh sends the email, he decides to investigate other methods of getting the file onto the system. For this particular attempt, what was the last stage of the cyber kill chain that Josh performed?

Options:

A.  

Exploitation

B.  

Weaponization

C.  

Delivery

D.  

Reconnaissance

Discussion 0
Question # 36

Which of the following types of SQL injection attacks extends the results returned by the original query, enabling attackers to run two or more statements if they have the same structure as the original one?

Options:

A.  

Error-based injection

B.  

Boolean-based blind SQL injection

C.  

Blind SQL injection

D.  

Union SQL injection

Discussion 0
Question # 37

Kate dropped her phone and subsequently encountered an issue with the phone's internal speaker. Thus, she is using the phone's loudspeaker for phone calls and other activities. Bob, an attacker, takes advantage of this vulnerability and secretly exploits the hardware of Kate's phone so that he can monitor the loudspeaker's output from data sources such as voice assistants, multimedia messages, and audio files by using a malicious app to breach speech privacy. What is the type of attack Bob performed on Kate in the above scenario?

Options:

A.  

Man-in-the-disk attack

B.  

aLTEr attack

C.  

SIM card attack

D.  

Spearphone attack

Discussion 0
Question # 38

What information security law or standard aims at protecting stakeholders and the general public from accounting errors and fraudulent activities within organizations?

Options:

A.  

PCI-DSS

B.  

FISMA

C.  

SOX

D.  

ISO/I EC 27001:2013

Discussion 0
Question # 39

Dayn, an attacker, wanted to detect if any honeypots are installed in a target network. For this purpose, he used a time-based TCP fingerprinting method to validate the response to a normal computer and the response of a honeypot to a manual SYN request. Which of the following techniques is employed by Dayn to detect honeypots?

Options:

A.  

Detecting honeypots running on VMware

B.  

Detecting the presence of Honeyd honeypots

C.  

Detecting the presence of Snort_inline honeypots

D.  

Detecting the presence of Sebek-based honeypots

Discussion 0
Question # 40

As a security analyst for Sky Secure Inc., you are working with a client that uses a multi-cloud strategy, utilizing services from several cloud providers. The client wants to implement a system that will provide unified security management across all their cloud platforms. They need a solution that allows them to consistently enforce security policies, identify and respond to threats, and maintain visibility of all their cloud resources. Which of the following should you recommend as the best solution?

Options:

A.  

Use a hardware-based firewall to secure all cloud resources.

B.  

implement separate security management tools for each cloud platform.

C.  

Use a Cloud Access Security Broker (CASB).

D.  

Rely on the built-in security features of each cloud platform.

Discussion 0
Question # 41

An audacious attacker is targeting a web server you oversee. He intends to perform a Slow HTTP POST attack, by manipulating 'a' HTTP connection. Each connection sends a byte of data every 'b' second, effectively holding up the connections for an extended period. Your server is designed to manage 'm' connections per second, but any connections exceeding this number tend to overwhelm the system. Given ‘a=100' and variable 'm', along with the attacker's intention of maximizing the attack duration 'D=a*b', consider the following scenarios. Which is most likely to result in the longest duration of server unavailability?

Options:

A.  

m=110, b=20: Despite the attacker sending 100 connections, the server can handle 110 connections per

second, therefore likely staying operative, regardless of the hold-up time per connection

B.  

m=90, b=15: The server can manage 90 connections per second, but the attacker's 100 connections

exceed this, and with each connection held up for 15 seconds, the attack duration could be significant

C.  

95, b=10: Here, the server can handle 95 connections per second, but it falls short against the

attacker's 100 connections, albeit the hold-up time per connection is lower

D.  

m=105, b=12: The server can manage 105 connections per second, more than the attacker's 100

connections, likely maintaining operation despite a moderate hold-up time

Discussion 0
Question # 42

A penetration tester was assigned to scan a large network range to find live hosts. The network is known for using strict TCP filtering rules on its firewall, which may obstruct common host discovery techniques. The tester needs a method that can bypass these firewall restrictions and accurately identify live systems. What host discovery technique should the tester use?

Options:

A.  

UDP Ping Scan

B.  

lCMP ECHO Ping Scan

C.  

ICMP Timestamp Ping Scan

D.  

TCP SYN Ping Scan

Discussion 0
Question # 43

Henry is a penetration tester who works for XYZ organization. While performing enumeration on a client organization, he queries the DNS server for a specific cached DNS record. Further, by using this cached record, he determines the sites recently visited by the organization's user. What is the enumeration technique used by Henry on the organization?

Options:

A.  

DNS zone walking

B.  

DNS cache snooping

C.  

DNS SEC zone walking

D.  

DNS cache poisoning

Discussion 0
Question # 44

You have compromised a server on a network and successfully opened a shell. You aimed to identify all operating systems running on the network. However, as you attempt to fingerprint all machines in the network using the nmap syntax below, it is not going through.

invictus@victim_server.~$ nmap -T4 -O 10.10.0.0/24 TCP/IP fingerprinting (for OS scan) xxxxxxx xxxxxx xxxxxxxxx. QUITTING!

What seems to be wrong?

Options:

A.  

The nmap syntax is wrong.

B.  

This is a common behavior for a corrupted nmap application.

C.  

The outgoing TCP/IP fingerprinting is blocked by the host firewall.

D.  

OS Scan requires root privileges.

Discussion 0
Question # 45

By performing a penetration test, you gained access under a user account. During the test, you established a connection with your own machine via the SMB service and occasionally entered your login and password in plaintext.

Which file do you have to clean to clear the password?

Options:

A.  

.X session-log

B.  

.bashrc

C.  

.profile

D.  

.bash_history

Discussion 0
Get 312-50v12 dumps and pass your exam in 24 hours!

Free Exams Sample Questions