EC-Council 312-50v12 Certified Ethical Hacker Exam (CEHv12) Online Training
EC-Council 312-50v12 Online Training
The questions for 312-50v12 were last updated at Jan 05,2025.
- Exam Code: 312-50v12
- Exam Name: Certified Ethical Hacker Exam (CEHv12)
- Certification Provider: EC-Council
- Latest update: Jan 05,2025
A company’s policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department. Using Wireshark to examine the captured traffic, which command can be used as display filter to find unencrypted file transfers?
- A . tcp.port = = 21
- B . tcp.port = 23
- C . tcp.port = = 21 | | tcp.port = =22
- D . tcp.port ! = 21
What is the minimum number of network connections in a multihomed firewall?
- A . 3
- B . 5
- C . 4
- D . 2
Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end-to-end encryption of the connection?
- A . SFTP
- B . Ipsec
- C . SSL
- D . FTPS
Which of the following is assured by the use of a hash?
- A . Authentication
- B . Confidentiality
- C . Availability
- D . Integrity
Bob is doing a password assessment for one of his clients. Bob suspects that security policies are not in place. He also suspects that weak passwords are probably the norm throughout the company he is evaluating. Bob is familiar with password weaknesses and key loggers.
Which of the following options best represents the means that Bob can adopt to retrieve passwords from his clients hosts and servers?
- A . Hardware, Software, and Sniffing.
- B . Hardware and Software Keyloggers.
- C . Passwords are always best obtained using Hardware key loggers.
- D . Software only, they are the most effective.
Which is the first step followed by Vulnerability Scanners for scanning a network?
- A . OS Detection
- B . Firewall detection
- C . TCP/UDP Port scanning
- D . Checking if the remote host is alive
Which is the first step followed by Vulnerability Scanners for scanning a network?
- A . OS Detection
- B . Firewall detection
- C . TCP/UDP Port scanning
- D . Checking if the remote host is alive
Which is the first step followed by Vulnerability Scanners for scanning a network?
- A . OS Detection
- B . Firewall detection
- C . TCP/UDP Port scanning
- D . Checking if the remote host is alive
Which is the first step followed by Vulnerability Scanners for scanning a network?
- A . OS Detection
- B . Firewall detection
- C . TCP/UDP Port scanning
- D . Checking if the remote host is alive
Which of the following programs is usually targeted at Microsoft Office products?
- A . Polymorphic virus
- B . Multipart virus
- C . Macro virus
- D . Stealth virus