EC-Council 312-50v12 Certified Ethical Hacker Exam (CEHv12) Online Training
EC-Council 312-50v12 Online Training
The questions for 312-50v12 were last updated at Jan 04,2025.
- Exam Code: 312-50v12
- Exam Name: Certified Ethical Hacker Exam (CEHv12)
- Certification Provider: EC-Council
- Latest update: Jan 04,2025
Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?
- A . 113
- B . 69
- C . 123
- D . 161
PGP, SSL, and IKE are all examples of which type of cryptography?
- A . Digest
- B . Secret Key
- C . Public Key
- D . Hash Algorithm
The “Gray-box testing” methodology enforces what kind of restriction?
- A . Only the external operation of a system is accessible to the tester.
- B . The internal operation of a system in only partly accessible to the tester.
- C . Only the internal operation of a system is known to the tester.
- D . The internal operation of a system is completely known to the tester.
What is the role of test automation in security testing?
- A . It is an option but it tends to be very expensive.
- B . It should be used exclusively. Manual testing is outdated because of low speed and possible test setup inconsistencies.
- C . Test automation is not usable in security due to the complexity of the tests.
- D . It can accelerate benchmark tests and repeat them with a consistent test setup. But it cannot replace manual testing completely.
As a securing consultant, what are some of the things you would recommend to a company to ensure DNS security?
- A . Use the same machines for DNS and other applications
- B . Harden DNS servers
- C . Use split-horizon operation for DNS servers
- D . Restrict Zone transfers
- E . Have subnet diversity between DNS servers
Your company performs penetration tests and security assessments for small and medium-sized business in the local area. During a routine security assessment, you discover information that suggests your client is involved with human trafficking.
What should you do?
- A . Confront the client in a respectful manner and ask her about the data.
- B . Copy the data to removable media and keep it in case you need it.
- C . Ignore the data and continue the assessment until completed as agreed.
- D . Immediately stop work and contact the proper legal authorities.
Which of the following tools can be used to perform a zone transfer?
- A . NSLookup
- B . Finger
- C . Dig
- D . Sam Spade
- E . Host
- F . Netcat
- G . Neotrace
Which of the following program infects the system boot sector and the executable files at the same time?
- A . Polymorphic virus
- B . Stealth virus
- C . Multipartite Virus
- D . Macro virus
A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system.
What is the first step that the bank should take before enabling the audit feature?
- A . Perform a vulnerability scan of the system.
- B . Determine the impact of enabling the audit feature.
- C . Perform a cost/benefit analysis of the audit feature.
- D . Allocate funds for staffing of audit log review.
Which results will be returned with the following Google search query? site:target.com C site:Marketing.target.com accounting
- A . Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting.
- B . Results matching all words in the query.
- C . Results for matches on target.com and Marketing.target.com that include the word “accounting”
- D . Results matching “accounting” in domain target.com but not on the site Marketing.target.com