EC-Council 312-50v12 Certified Ethical Hacker Exam (CEHv12) Online Training
EC-Council 312-50v12 Online Training
The questions for 312-50v12 were last updated at Jan 06,2025.
- Exam Code: 312-50v12
- Exam Name: Certified Ethical Hacker Exam (CEHv12)
- Certification Provider: EC-Council
- Latest update: Jan 06,2025
DHCP snooping is a great solution to prevent rogue DHCP servers on your network.
Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?
- A . Spanning tree
- B . Dynamic ARP Inspection (DAI)
- C . Port security
- D . Layer 2 Attack Prevention Protocol (LAPP)
DHCP snooping is a great solution to prevent rogue DHCP servers on your network.
Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?
- A . Spanning tree
- B . Dynamic ARP Inspection (DAI)
- C . Port security
- D . Layer 2 Attack Prevention Protocol (LAPP)
DHCP snooping is a great solution to prevent rogue DHCP servers on your network.
Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?
- A . Spanning tree
- B . Dynamic ARP Inspection (DAI)
- C . Port security
- D . Layer 2 Attack Prevention Protocol (LAPP)
DHCP snooping is a great solution to prevent rogue DHCP servers on your network.
Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?
- A . Spanning tree
- B . Dynamic ARP Inspection (DAI)
- C . Port security
- D . Layer 2 Attack Prevention Protocol (LAPP)
DHCP snooping is a great solution to prevent rogue DHCP servers on your network.
Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?
- A . Spanning tree
- B . Dynamic ARP Inspection (DAI)
- C . Port security
- D . Layer 2 Attack Prevention Protocol (LAPP)
Attacker creates a transparent ‘iframe’ in front of the URL which victim attempts to click, so victim thinks that he/she clicks to the ‘Do you want to make $1000 in a day?’ URL but actually he/she clicks to the content or URL that exists in the transparent ‘iframe’ which is setup by the attacker.
What is the name of the attack which is mentioned in the scenario?
- A . Session Fixation
- B . HTML Injection
- C . HTTP Parameter Pollution
- D . Clickjacking Attack
The collection of potentially actionable, overt, and publicly available information is known as
- A . Open-source intelligence
- B . Real intelligence
- C . Social intelligence
- D . Human intelligence
What is the proper response for a NULL scan if the port is open?
- A . SYN
- B . ACK
- C . FIN
- D . PSH
- E . RST
- F . No response
Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?
- A . Kismet
- B . Abel
- C . Netstumbler
- D . Nessus
Which method of password cracking takes the most time and effort?
- A . Dictionary attack
- B . Shoulder surfing
- C . Rainbow tables
- D . Brute force