exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 29 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 29
Topic #: 1
[All 312-50v12 Questions]

Nicolas just found a vulnerability on a public-facing system that is considered a zero-day vulnerability. He sent an email to the owner of the public system describing the problem and how the owner can protect themselves from that vulnerability. He also sent an email to Microsoft informing them of the problem that their systems are exposed to.
What type of hacker is Nicolas?

  • A. Black hat
  • B. White hat
  • C. Gray hat
  • D. Red hat
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
SailOn
Highly Voted 1 year, 3 months ago
From CEH v12 book, the defining feature of a white hat is PERMISSION. That's Chapter 1, and the whole point of the entire CEH course, PERMISSION. If you do not have it, you are not a white hat. So answer is C. GRAY HAT
upvoted 24 times
qtygbapjpesdayazko
9 months, 1 week ago
This is true!
upvoted 1 times
qtygbapjpesdayazko
9 months, 1 week ago
White Hats, Keyword "They have permission from the system owner." White Hats: White hats or penetration testers are individuals who use their hacking skills for defensive purposes. These days, almost every organization has security analysts who are knowledgeable about hacking countermeasures, which can secure its network and information systems against malicious attacks. They have permission from the system owner. Gray Hats: Gray hats are the individuals who work both offensively and defensively at various times. Gray hats might help hackers to find various vulnerabilities in a system or network and, at the same time, help vendors to improve products (software or hardware) by checking limitations and making them more secure.
upvoted 1 times
...
...
...
blehbleh
Most Recent 3 weeks ago
Selected Answer: C
This is C. If you think this is B you should not take this exam.
upvoted 2 times
...
7c4eac1
1 month ago
Selected Answer: B
White Hat is the right answer. Grey is a combination of both White and Black. white during the day and black during night.
upvoted 2 times
...
W1seByt3s
1 month ago
Selected Answer: C
- Answer is C (No permission + Good intentions = Gey hat)
upvoted 1 times
...
bomboclad
2 months, 1 week ago
Selected Answer: C
C the hack did not start with permission then he was Black but when he reported the zero day he became gray not White because he did not start with permission
upvoted 1 times
...
afonsopaizin
2 months, 3 weeks ago
Selected Answer: C
the c is correct
upvoted 1 times
...
f257c4e
6 months, 4 weeks ago
I was misleaded by the good intentions of Nicolas, but he doesn't have permission.
upvoted 2 times
...
qtygbapjpesdayazko
9 months, 1 week ago
Selected Answer: C
White Hats, Keyword "They have permission from the system owner."
upvoted 1 times
...
0ea2cf3
9 months, 4 weeks ago
White hat hacker because even though Nicolas did not have permission, it was a public-facing website that implied that Nicholas did not have to do anything nefarious to access the site.
upvoted 4 times
...
Theclassicman
11 months, 3 weeks ago
Does not say they got permission first to scan. So I would consider them a gray hat hacker.
upvoted 2 times
...
Hapipass
11 months, 3 weeks ago
Selected Answer: C
C. Gray Hat White Hat (with Permission and good intention) + Black Hat (without permission and bad intention) = Gray Hat ( with/without permission and good/bad intention)
upvoted 2 times
...
Folken
12 months ago
Selected Answer: C
Gray Hats : no permission
upvoted 1 times
...
insaniunt
1 year ago
Selected Answer: C
pag 39 from CEH v12 book: White Hats Individuals who use their professed hacking skills for defensive purposes and are also known as security analysts. They have permission from the system owner Gray Hats Individuals who work both offensively and defensively at various times
upvoted 1 times
...
insaniunt
1 year ago
Selected Answer: C
See page 39 from CEH v12 book. White Hats: Individuals who use their professed hacking skills for defensive purposes and are also known as security analysts. They have permission from the system owner (end Nicolas dont have) So, Nicolas are: C. Gray Hats Individuals who work both offensively and defensively at various times
upvoted 2 times
...
Winson
1 year, 1 month ago
Selected Answer: C
without the knowledge of system owner
upvoted 1 times
...
YourFriendlyNeighborhoodSpider
1 year, 1 month ago
Selected Answer: C
ChatGPT answer: Answer: C. Gray hat Gray hat (option C): Gray hat hackers fall somewhere in between black hat and white hat hackers. They may discover and exploit vulnerabilities without explicit permission but do so with the intent of notifying the affected parties and helping them secure their systems.
upvoted 1 times
...
JacksonTrite
1 year, 1 month ago
Selected Answer: B
It's a "public facing system". In the USA at least, things that are public often do not require any special permissions...
upvoted 3 times
I_Know_Everything_KY
10 months, 1 week ago
This is absolutely and totally wrong. I suggest you check out federal laws concerning accessing computer systems without the knowledge or permission of the owner. Its wrong for most parts of the world.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago