EC-Council 312-50v12 Certified Ethical Hacker Exam (CEHv12) Online Training
EC-Council 312-50v12 Online Training
The questions for 312-50v12 were last updated at Dec 26,2024.
- Exam Code: 312-50v12
- Exam Name: Certified Ethical Hacker Exam (CEHv12)
- Certification Provider: EC-Council
- Latest update: Dec 26,2024
You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible. But they are not accessible when you try using the URL.
What may be the problem?
- A . Traffic is Blocked on UDP Port 53
- B . Traffic is Blocked on TCP Port 80
- C . Traffic is Blocked on TCP Port 54
- D . Traffic is Blocked on UDP Port 80
You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible. But they are not accessible when you try using the URL.
What may be the problem?
- A . Traffic is Blocked on UDP Port 53
- B . Traffic is Blocked on TCP Port 80
- C . Traffic is Blocked on TCP Port 54
- D . Traffic is Blocked on UDP Port 80
You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible. But they are not accessible when you try using the URL.
What may be the problem?
- A . Traffic is Blocked on UDP Port 53
- B . Traffic is Blocked on TCP Port 80
- C . Traffic is Blocked on TCP Port 54
- D . Traffic is Blocked on UDP Port 80
What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?
- A . Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.
- B . Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.
- C . Symmetric encryption allows the server to security transmit the session keys out-of-band.
- D . Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.
Which of the following is not a Bluetooth attack?
- A . Bluedriving
- B . Bluesmacking
- C . Bluejacking
- D . Bluesnarfing
Email is transmitted across the Internet using the Simple Mail Transport Protocol. SMTP does not encrypt email, leaving the information in the message vulnerable to being read by an unauthorized person. SMTP can upgrade a connection between two mail servers to use TLS. Email transmitted by SMTP over TLS is encrypted.
What is the name of the command used by SMTP to transmit email over TLS?
- A . OPPORTUNISTICTLS
- B . UPGRADETLS
- C . FORCETLS
- D . STARTTLS
Let’s imagine three companies (A, B and C), all competing in a challenging global environment. Company A and B are working together in developing a product that will generate a major competitive advantage for them. Company A has a secure DNS server while company B has a DNS server vulnerable to spoofing. With a spoofing attack on the DNS server of company B, company C gains access to outgoing e-mails from company B.
How do you prevent DNS spoofing?
- A . Install DNS logger and track vulnerable packets
- B . Disable DNS timeouts
- C . Install DNS Anti-spoofing
- D . Disable DNS Zone Transfer
An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", the user is directed to a phishing site.
Which file does the attacker need to modify?
- A . Boot.ini
- B . Sudoers
- C . Networks
- D . Hosts
What kind of detection techniques is being used in antivirus software that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it’s made on the provider’s environment?
- A . Behavioral based
- B . Heuristics based
- C . Honeypot based
- D . Cloud based
If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?
- A . Birthday
- B . Brute force
- C . Man-in-the-middle
- D . Smurf