EC-Council 312-50v12 Certified Ethical Hacker Exam (CEHv12) Online Training
EC-Council 312-50v12 Online Training
The questions for 312-50v12 were last updated at Dec 29,2024.
- Exam Code: 312-50v12
- Exam Name: Certified Ethical Hacker Exam (CEHv12)
- Certification Provider: EC-Council
- Latest update: Dec 29,2024
While using your bank’s online servicing you notice the following string in the URL bar:
“http: // www. MyPersonalBank. com/ account?id=368940911028389&Damount=10980&Camount=21”
You observe that if you modify the Damount & Camount values and submit the request, that data on the web page reflects the changes.
Which type of vulnerability is present on this site?
- A . Cookie Tampering
- B . SQL Injection
- C . Web Parameter Tampering
- D . XSS Reflection
Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?
- A . har.txt
- B . SAM file
- C . wwwroot
- D . Repair file
You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration? alert tcp any any -> 192.168.100.0/24 21 (msg: ““FTP on the network!””;)
- A . A firewall IPTable
- B . FTP Server rule
- C . A Router IPTable
- D . An Intrusion Detection System
An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up.
What is the most likely cause?
- A . The network devices are not all synchronized.
- B . Proper chain of custody was not observed while collecting the logs.
- C . The attacker altered or erased events from the logs.
- D . The security breach was a false positive.
Which DNS resource record can indicate how long any "DNS poisoning" could last?
- A . MX
- B . SOA
- C . NS
- D . TIMEOUT
A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0/24.
Which of the following has occurred?
- A . The computer is not using a private IP address.
- B . The gateway is not routing to a public IP address.
- C . The gateway and the computer are not on the same network.
- D . The computer is using an invalid IP address.
The establishment of a TCP connection involves a negotiation called three-way handshake.
What type of message does the client send to the server in order to begin this negotiation?
- A . ACK
- B . SYN
- C . RST
- D . SYN-ACK
Which of the following tools are used for enumeration? (Choose three.)
- A . SolarWinds
- B . USER2SID
- C . Cheops
- D . SID2USER
- E . DumpSec
When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator’s Computer to update the router configuration.
What type of an alert is this?
- A . False negative
- B . True negative
- C . True positive
- D . False positive
Under what conditions does a secondary name server request a zone transfer from a primary name server?
- A . When a primary SOA is higher that a secondary SOA
- B . When a secondary SOA is higher that a primary SOA
- C . When a primary name server has had its service restarted
- D . When a secondary name server has had its service restarted
- E . When the TTL falls to zero