Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

312-50v12 Certified Ethical Hacker Exam (CEHv12) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

312-50v12 Practice Questions

Certified Ethical Hacker Exam (CEHv12)

Last Update 4 days ago
Total Questions : 572

Dive into our fully updated and stable 312-50v12 practice test platform, featuring all the latest CEH v12 exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free CEH v12 practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 312-50v12. Use this test to pinpoint which areas you need to focus your study on.

312-50v12 PDF

312-50v12 PDF (Printable)
$43.75
$124.99

312-50v12 Testing Engine

312-50v12 PDF (Printable)
$50.75
$144.99

312-50v12 PDF + Testing Engine

312-50v12 PDF (Printable)
$63.7
$181.99
Question # 121

An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the network’s external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file. What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?

Options:

A.  

Protocol analyzer

B.  

Network sniffer

C.  

Intrusion Prevention System (IPS)

D.  

Vulnerability scanner

Discussion 0
Question # 122

A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer’s software and hardware without the owner’s permission. Their intention can either be to simply gain knowledge or to illegally make changes.

Which of the following class of hacker refers to an individual who works both offensively and defensively at various times?

Options:

A.  

White Hat

B.  

Suicide Hacker

C.  

Gray Hat

D.  

Black Hat

Discussion 0
Question # 123

You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist’s email, and you send her an email changing the source email to her boss’s email (boss@company). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with links. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don’t work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network. What testing method did you use?

Options:

A.  

Social engineering

B.  

Piggybacking

C.  

Tailgating

D.  

Eavesdropping

Discussion 0
Question # 124

What is the proper response for a NULL scan if the port is open?

Options:

A.  

SYN

B.  

ACK

C.  

FIN

D.  

PSH

E.  

RST

F.  

No response

Discussion 0
Question # 125

Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?

Options:

A.  

Kismet

B.  

Abel

C.  

Netstumbler

D.  

Nessus

Discussion 0
Question # 126

Null sessions are un-authenticated connections (not using a username or password.) to an NT or 2000 system. Which TCP and UDP ports must you filter to check null sessions on your network?

Options:

A.  

137 and 139

B.  

137 and 443

C.  

139 and 443

D.  

139 and 445

Discussion 0
Question # 127

Which of the following programs is usually targeted at Microsoft Office products?

Options:

A.  

Polymorphic virus

B.  

Multipart virus

C.  

Macro virus

D.  

Stealth virus

Discussion 0
Question # 128

Which of the following describes the characteristics of a Boot Sector Virus?

Options:

A.  

Modifies directory table entries so that directory entries point to the virus code instead of the actual program.

B.  

Moves the MBR to another location on the RAM and copies itself to the original location of the MBR.

C.  

Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR.

D.  

Overwrites the original MBR and only executes the new virus code.

Discussion 0
Question # 129

You have the SOA presented below in your Zone.

Your secondary servers have not been able to contact your primary server to synchronize information. How long will the secondary servers attempt to contact the primary server before it considers that zone is dead and stops responding to queries?

collegae.edu.SOA, cikkye.edu ipad.college.edu. (200302028 3600 3600 604800 3600)

Options:

A.  

One day

B.  

One hour

C.  

One week

D.  

One month

Discussion 0
Question # 130

User A is writing a sensitive email message to user B outside the local network. User A has chosen to use PKI to secure his message and ensure only user B can read the sensitive email. At what layer of the OSI layer does the encryption and decryption of the message take place?

Options:

A.  

Application

B.  

Transport

C.  

Session

D.  

Presentation

Discussion 0
Question # 131

What does a firewall check to prevent particular ports and applications from getting packets into an organization?

Options:

A.  

Transport layer port numbers and application layer headers

B.  

Presentation layer headers and the session layer port numbers

C.  

Network layer headers and the session layer port numbers

D.  

Application layer port numbers and the transport layer headers

Discussion 0
Question # 132

Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?

Options:

A.  

har.txt

B.  

SAM file

C.  

wwwroot

D.  

Repair file

Discussion 0
Question # 133

What is the purpose of a demilitarized zone on a network?

Options:

A.  

To scan all traffic coming through the DMZ to the internal network

B.  

To only provide direct access to the nodes within the DMZ and protect the network behind it

C.  

To provide a place to put the honeypot

D.  

To contain the network devices you wish to protect

Discussion 0
Question # 134

Which of the following tools are used for enumeration? (Choose three.)

Options:

A.  

SolarWinds

B.  

USER2SID

C.  

Cheops

D.  

SID2USER

E.  

DumpSec

Discussion 0
Question # 135

What is the following command used for?

net use \targetipc$ "" /u:""

Options:

A.  

Grabbing the etc/passwd file

B.  

Grabbing the SAM

C.  

Connecting to a Linux computer through Samba.

D.  

This command is used to connect as a null session

E.  

Enumeration of Cisco routers

Discussion 0
Get 312-50v12 dumps and pass your exam in 24 hours!

Free Exams Sample Questions