Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

312-50v12 Certified Ethical Hacker Exam (CEHv12) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

312-50v12 Practice Questions

Certified Ethical Hacker Exam (CEHv12)

Last Update 4 days ago
Total Questions : 572

Dive into our fully updated and stable 312-50v12 practice test platform, featuring all the latest CEH v12 exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free CEH v12 practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 312-50v12. Use this test to pinpoint which areas you need to focus your study on.

312-50v12 PDF

312-50v12 PDF (Printable)
$43.75
$124.99

312-50v12 Testing Engine

312-50v12 PDF (Printable)
$50.75
$144.99

312-50v12 PDF + Testing Engine

312-50v12 PDF (Printable)
$63.7
$181.99
Question # 46

As a part of an ethical hacking exercise, an attacker is probing a target network that is suspected to employ various honeypot systems for security. The attacker needs to detect and bypass these honeypots without alerting the target. The attacker decides to utilize a suite of techniques. Which of the following techniques would NOT assist in detecting a honeypot?

Options:

A.  

Probing system services and observing the three-way handshake

B.  

Using honeypot detection tools like Send-Safe Honeypot Hunter

C.  

Implementing a brute force attack to verify system vulnerability

D.  

Analyzing the MAC address to detect instances running on VMware

Discussion 0
Question # 47

John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization. Which of the following attack techniques is used by John?

Options:

A.  

Advanced persistent theft

B.  

threat Diversion theft

C.  

Spear-phishing sites

D.  

insider threat

Discussion 0
Question # 48

Richard, an attacker, targets an MNC In this process, he uses a footprinting technique to gather as much information as possible. Using this technique, he gathers domain information such as the target domain name, contact details of its owner, expiry date, and creation date. With this information, he creates a map of the organization's network and misleads domain owners with social engineering to obtain internal details of its network. What type of footprinting technique is employed by Richard?

Options:

A.  

VPN footprinting

B.  

Email footprinting

C.  

VoIP footprinting

D.  

Whois footprinting

Discussion 0
Question # 49

You are using a public Wi-Fi network inside a coffee shop. Before surfing the web, you use your VPN to prevent intruders from sniffing your traffic. If you did not have a VPN, how would you identify whether someone is performing an ARP spoofing attack on your laptop?

Options:

A.  

You should check your ARP table and see if there is one IP address with two different MAC addresses.

B.  

You should scan the network using Nmap to check the MAC addresses of all the hosts and look for duplicates.

C.  

You should use netstat to check for any suspicious connections with another IP address within the LAN.

D.  

You cannot identify such an attack and must use a VPN to protect your traffic, r

Discussion 0
Question # 50

A large corporate network is being subjected to repeated sniffing attacks. To increase security, the company’s IT department decides to implement a combination of several security measures. They permanently add theMAC address of the gateway to the ARP cache, switch to using IPv6 instead of IPv4, implement the use of encrypted sessions such as SSH instead of Telnet, and use Secure File Transfer Protocol instead of FTP.

However, they are still faced with the threat of sniffing. Considering the countermeasures, what should be their next step to enhance network security?

Options:

A.  

Use HTTP instead of HTTPS for protecting usernames and passwords

B.  

Implement network scanning and monitoring tools

C.  

Enable network identification broadcasts

D.  

Retrieve MAC addresses from the OS

Discussion 0
Question # 51

Don, a student, came across a gaming app in a third-party app store and Installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after Installing the app. What is the attack performed on Don in the above scenario?

Options:

A.  

SMS phishing attack

B.  

SIM card attack

C.  

Agent Smith attack

D.  

Clickjacking

Discussion 0
Question # 52

Jake, a professional hacker, installed spyware on a target iPhone to spy on the target user's activities. He can take complete control of the target mobile device by jailbreaking the device remotely and record audio, capture screenshots, and monitor all phone calls and SMS messages. What is the type of spyware that Jake used to infect the target device?

Options:

A.  

DroidSheep

B.  

Androrat

C.  

Zscaler

D.  

Trident

Discussion 0
Question # 53

Joel, a professional hacker, targeted a company and identified the types of websites frequently visited by its employees. Using this information, he searched for possible loopholes in these websites and injected a malicious script that can redirect users from the web page and download malware onto a victim's machine. Joel waits for the victim to access the infected web application so as to compromise the victim's machine. Which of the following techniques is used by Joel in the above scenario?

Options:

A.  

DNS rebinding attack

B.  

Clickjacking attack

C.  

MarioNet attack

D.  

Watering hole attack

Discussion 0
Question # 54

Firewalk has just completed the second phase (the scanning phase) and a technician receives the output shown below. What conclusions can be drawn based on these scan results?

TCP port 21 no response

TCP port 22 no response

TCP port 23 Time-to-live exceeded

Options:

A.  

The lack of response from ports 21 and 22 indicate that those services are not running on the destination server

B.  

The scan on port 23 was able to make a connection to the destination host prompting the firewall to respond with a TTL error

C.  

The scan on port 23 passed through the filtering device. This indicates that port 23 was not blocked at the firewall

D.  

The firewall itself is blocking ports 21 through 23 and a service is listening on port 23 of the target host

Discussion 0
Question # 55

An attacker utilizes a Wi-Fi Pineapple to run an access point with a legitimate-looking SSID for a nearby business in order to capture the wireless password. What kind of attack is this?

Options:

A.  

MAC spoofing attack

B.  

Evil-twin attack

C.  

War driving attack

D.  

Phishing attack

Discussion 0
Question # 56

Sophia is a shopping enthusiast who spends significant time searching for trendy outfits online. Clark, an attacker, noticed her activities several times and sent a fake email containing a deceptive page link to her social media page displaying all-new and trendy outfits. In excitement, Sophia clicked on the malicious link and logged in to that page using her valid credentials. Which of the following tools is employed by Clark to create the spoofed email?

Options:

A.  

PyLoris

B.  

Slowloris

C.  

Evilginx

D.  

PLCinject

Discussion 0
Question # 57

Which type of malware spreads from one system to another or from one network to another and causes similar types of damage as viruses do to the infected system?

Options:

A.  

Rootkit

B.  

Trojan

C.  

Worm

D.  

Adware

Discussion 0
Question # 58

Attacker Lauren has gained the credentials of an organization's internal server system, and she was often logging in during irregular times to monitor the network activities. The organization was skeptical about the login times and appointed security professional Robert to determine the issue. Robert analyzed the compromised device to find incident details such as the type of attack, its severity, target, impact, method of propagation, and vulnerabilities exploited. What is the incident handling and response (IH&R) phase, in which Robert has determined these issues?

Options:

A.  

Preparation

B.  

Eradication

C.  

Incident recording and assignment

D.  

Incident triage

Discussion 0
Question # 59

Bob, an attacker, has managed to access a target loT device. He employed an online tool to gather information related to the model of the loT device and the certifications granted to it. Which of the following tools did Bob employ to gather the above Information?

Options:

A.  

search.com

B.  

EarthExplorer

C.  

Google image search

D.  

FCC ID search

Discussion 0
Question # 60

Windows LAN Manager (LM) hashes are known to be weak.

Which of the following are known weaknesses of LM? (Choose three.)

Options:

A.  

Converts passwords to uppercase.

B.  

Hashes are sent in clear text over the network.

C.  

Makes use of only 32-bit encryption.

D.  

Effective length is 7 characters.

Discussion 0
Get 312-50v12 dumps and pass your exam in 24 hours!

Free Exams Sample Questions