EC-Council 312-50v12 Certified Ethical Hacker Exam (CEHv12) Online Training
EC-Council 312-50v12 Online Training
The questions for 312-50v12 were last updated at Dec 24,2024.
- Exam Code: 312-50v12
- Exam Name: Certified Ethical Hacker Exam (CEHv12)
- Certification Provider: EC-Council
- Latest update: Dec 24,2024
Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?
- A . Nikto
- B . John the Ripper
- C . Dsniff
- D . Snort
Tess King is using the nslookup command to craft queries to list all DNS information (such as Name Servers, host names, MX records, CNAME records, glue records (delegation for child Domains), zone serial number, TimeToLive (TTL) records, etc) for a Domain.
What do you think Tess King is trying to accomplish? Select the best answer.
- A . A zone harvesting
- B . A zone transfer
- C . A zone update
- D . A zone estimate
What is the purpose of a demilitarized zone on a network?
- A . To scan all traffic coming through the DMZ to the internal network
- B . To only provide direct access to the nodes within the DMZ and protect the network behind it
- C . To provide a place to put the honeypot
- D . To contain the network devices you wish to protect
Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?
- A . ESP transport mode
- B . ESP confidential
- C . AH permiscuous
- D . AH Tunnel mode
Todd has been asked by the security officer to purchase a counter-based authentication system.
Which of the following best describes this type of system?
- A . A biometric system that bases authentication decisions on behavioral attributes.
- B . A biometric system that bases authentication decisions on physical attributes.
- C . An authentication system that creates one-time passwords that are encrypted with secret keys.
- D . An authentication system that uses passphrases that are converted into virtual passwords.
Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students.
He identified this when the IDS alerted for malware activities in the network.
What should Bob do to avoid this problem?
- A . Disable unused ports in the switches
- B . Separate students in a different VLAN
- C . Use the 802.1x protocol
- D . Ask students to use the wireless network
You have gained physical access to a Windows 2008 R2 server which has an accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your toolkit, you have an Ubuntu 9.10 Linux LiveCD.
Which Linux-based tool can change any user’s password or activate disabled Windows accounts?
- A . John the Ripper
- B . SET
- C . CHNTPW
- D . Cain & Abel
What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall if your network is comprised of Windows NT, 2000, and XP?
- A . 110
- B . 135
- C . 139
- D . 161
- E . 445
- F . 1024
What is not a PCI compliance recommendation?
- A . Use a firewall between the public network and the payment card data.
- B . Use encryption to protect all transmission of card holder data over any public network.
- C . Rotate employees handling credit card transactions on a yearly basis to different departments.
- D . Limit access to card holder data to as few individuals as possible.
What is not a PCI compliance recommendation?
- A . Use a firewall between the public network and the payment card data.
- B . Use encryption to protect all transmission of card holder data over any public network.
- C . Rotate employees handling credit card transactions on a yearly basis to different departments.
- D . Limit access to card holder data to as few individuals as possible.