312-50v12 Actual Exam Questions

Last updated on Nov. 27, 2024.
Vendor:ECCouncil
Exam Code:312-50v12
Exam Name:Certified Ethical Hacker v12 Exam
Exam Questions:309
 

Topic 1 - Exam A

Question #1 Topic 1

In this form of encryption algorithm, every individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?

  • A. IDEA
  • B. Triple Data Encryption Standard
  • C. AES
  • D. MD5 encryption algorithm
Reveal Solution Hide Solution   Discussion   10

Correct Answer: B 🗳️

Question #2 Topic 1

John is investigating web-application firewall logs and observers that someone is attempting to inject the following:

What type of attack is this?

  • A. SQL injection
  • B. Buffer overflow
  • C. CSRF
  • D. XSS
Reveal Solution Hide Solution   Discussion   6

Correct Answer: B 🗳️

Question #3 Topic 1

John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization.
Which of the following attack techniques is used by John?

  • A. Insider threat
  • B. Diversion theft
  • C. Spear-phishing sites
  • D. Advanced persistent threat
Reveal Solution Hide Solution   Discussion   4

Correct Answer: D 🗳️

Question #4 Topic 1

You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?

  • A. nmap -A - Pn
  • B. nmap -sP -p-65535 -T5
  • C. nmap -sT -O -T0
  • D. nmap -A --host-timeout 99 -T1
Reveal Solution Hide Solution   Discussion   8

Correct Answer: C 🗳️

Question #5 Topic 1

This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as GCMP-256, HMAC-SHA384, and ECDSA using a 384-bit elliptic curve.
Which is this wireless security protocol?

  • A. WPA3-Personal
  • B. WPA3-Enterprise
  • C. WPA2-Enterprise
  • D. WPA2-Personal
Reveal Solution Hide Solution   Discussion   4

Correct Answer: B 🗳️

Question #6 Topic 1

What are common files on a web server that can be misconfigured and provide useful information for a hacker such as verbose error messages?

  • A. httpd.conf
  • B. administration.config
  • C. php.ini
  • D. idq.dll
Reveal Solution Hide Solution   Discussion   11

Correct Answer: C 🗳️

Question #7 Topic 1

Gerard, a disgruntled ex-employee of Sunglass IT Solutions, targets this organization to perform sophisticated attacks and bring down its reputation in the market. To launch the attacks process, he performed DNS footprinting to gather information about DNS servers and to identify the hosts connected in the target network. He used an automated tool that can retrieve information about DNS zone data including DNS domain names, computer names, IP addresses, DNS records, and network Whois records. He further exploited this information to launch other sophisticated attacks.
What is the tool employed by Gerard in the above scenario?

  • A. Towelroot
  • B. Knative
  • C. zANTI
  • D. Bluto
Reveal Solution Hide Solution   Discussion   4

Correct Answer: D 🗳️

Question #8 Topic 1

Tony is a penetration tester tasked with performing a penetration test. After gaining initial access to a target system, he finds a list of hashed passwords.
Which of the following tools would not be useful for cracking the hashed passwords?

  • A. Hashcat
  • B. John the Ripper
  • C. THC-Hydra
  • D. netcat
Reveal Solution Hide Solution   Discussion   25

Correct Answer: D 🗳️

Question #9 Topic 1

Which of the following Google advanced search operators helps an attacker in gathering information about websites that are similar to a specified target URL?

  • A. [inurl:]
  • B. [info:]
  • C. [site:]
  • D. [related:]
Reveal Solution Hide Solution   Discussion   7

Correct Answer: D 🗳️

Question #10 Topic 1

You are a penetration tester working to test the user awareness of the employees of the client XYZ. You harvested two employees’ emails from some public sources and are creating a client-side backdoor to send it to the employees via email.
Which stage of the cyber kill chain are you at?

  • A. Reconnaissance
  • B. Weaponization
  • C. Command and control
  • D. Exploitation
Reveal Solution Hide Solution   Discussion   15

Correct Answer: B 🗳️

file Viewing page 1 out of 31 pages.
Viewing questions 1-10 out of 309 questions
Next Questions
Browse atleast 50% to increase passing rate cup
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago