Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 29 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 29
Topic #: 1
[All 312-50v12 Questions]

Nicolas just found a vulnerability on a public-facing system that is considered a zero-day vulnerability. He sent an email to the owner of the public system describing the problem and how the owner can protect themselves from that vulnerability. He also sent an email to Microsoft informing them of the problem that their systems are exposed to.
What type of hacker is Nicolas?

  • A. Black hat
  • B. White hat
  • C. Gray hat
  • D. Red hat
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
SailOn
Highly Voted 1 year, 1 month ago
From CEH v12 book, the defining feature of a white hat is PERMISSION. That's Chapter 1, and the whole point of the entire CEH course, PERMISSION. If you do not have it, you are not a white hat. So answer is C. GRAY HAT
upvoted 19 times
qtygbapjpesdayazko
7 months, 2 weeks ago
This is true!
upvoted 1 times
qtygbapjpesdayazko
7 months, 2 weeks ago
White Hats, Keyword "They have permission from the system owner." White Hats: White hats or penetration testers are individuals who use their hacking skills for defensive purposes. These days, almost every organization has security analysts who are knowledgeable about hacking countermeasures, which can secure its network and information systems against malicious attacks. They have permission from the system owner. Gray Hats: Gray hats are the individuals who work both offensively and defensively at various times. Gray hats might help hackers to find various vulnerabilities in a system or network and, at the same time, help vendors to improve products (software or hardware) by checking limitations and making them more secure.
upvoted 1 times
...
...
...
bomboclad
Most Recent 3 weeks, 1 day ago
Selected Answer: C
C the hack did not start with permission then he was Black but when he reported the zero day he became gray not White because he did not start with permission
upvoted 1 times
...
afonsopaizin
1 month ago
Selected Answer: C
the c is correct
upvoted 1 times
...
f257c4e
5 months, 1 week ago
I was misleaded by the good intentions of Nicolas, but he doesn't have permission.
upvoted 2 times
...
qtygbapjpesdayazko
7 months, 2 weeks ago
Selected Answer: C
White Hats, Keyword "They have permission from the system owner."
upvoted 1 times
...
0ea2cf3
8 months, 1 week ago
White hat hacker because even though Nicolas did not have permission, it was a public-facing website that implied that Nicholas did not have to do anything nefarious to access the site.
upvoted 3 times
...
Theclassicman
10 months ago
Does not say they got permission first to scan. So I would consider them a gray hat hacker.
upvoted 2 times
...
Hapipass
10 months ago
Selected Answer: C
C. Gray Hat White Hat (with Permission and good intention) + Black Hat (without permission and bad intention) = Gray Hat ( with/without permission and good/bad intention)
upvoted 2 times
...
Folken
10 months, 1 week ago
Selected Answer: C
Gray Hats : no permission
upvoted 1 times
...
insaniunt
11 months, 1 week ago
Selected Answer: C
pag 39 from CEH v12 book: White Hats Individuals who use their professed hacking skills for defensive purposes and are also known as security analysts. They have permission from the system owner Gray Hats Individuals who work both offensively and defensively at various times
upvoted 1 times
...
insaniunt
11 months, 1 week ago
Selected Answer: C
See page 39 from CEH v12 book. White Hats: Individuals who use their professed hacking skills for defensive purposes and are also known as security analysts. They have permission from the system owner (end Nicolas dont have) So, Nicolas are: C. Gray Hats Individuals who work both offensively and defensively at various times
upvoted 2 times
...
Winson
11 months, 2 weeks ago
Selected Answer: C
without the knowledge of system owner
upvoted 1 times
...
YourFriendlyNeighborhoodSpider
11 months, 3 weeks ago
Selected Answer: C
ChatGPT answer: Answer: C. Gray hat Gray hat (option C): Gray hat hackers fall somewhere in between black hat and white hat hackers. They may discover and exploit vulnerabilities without explicit permission but do so with the intent of notifying the affected parties and helping them secure their systems.
upvoted 1 times
...
JacksonTrite
12 months ago
Selected Answer: B
It's a "public facing system". In the USA at least, things that are public often do not require any special permissions...
upvoted 2 times
I_Know_Everything_KY
8 months, 3 weeks ago
This is absolutely and totally wrong. I suggest you check out federal laws concerning accessing computer systems without the knowledge or permission of the owner. Its wrong for most parts of the world.
upvoted 1 times
...
...
sringan
1 year ago
Selected Answer: B
Here the person is not doing any malicious activities, or trying to exploit that vulnerability. He just informs about the flaw and doesn't ask any rewards.He's showing the vulnerability to microsoft so that they might be able to suggest a fix. No evil intensions. So he's a whitehat hacker.
upvoted 3 times
...
iitc_duo
1 year ago
Gray hat hackers often look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found, they report them to the owner, sometimes requesting a small fee to fix the problem. Some gray hat hackers like to believe they are doing something good for companies by hacking their websites and invading their networks "without permission". Still, company owners rarely appreciate unauthorized forays into their business information infrastructure.
upvoted 1 times
...
kunnu
1 year, 1 month ago
Answer is C : Gray Hat. here hacker didn't ask the permission to find the zero day vulnerability neither ask Microsoft about it. No where mentioned any synonym related to Permission in statements.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...