EC-Council 312-50v12 Real Exam Questions
The questions for 312-50v12 were last updated at Nov 19,2024.
- Exam Code: 312-50v12
- Exam Name: Certified Ethical Hacker Exam (CEHv12)
- Certification Provider: EC-Council
- Latest update: Nov 19,2024
Which of the following describes the characteristics of a Boot Sector Virus?
- A . Modifies directory table entries so that directory entries point to the virus code instead of the actual program.
- B . Moves the MBR to another location on the RAM and copies itself to the original location of the MBR.
- C . Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR.
- D . Overwrites the original MBR and only executes the new virus code.
The “Gray-box testing” methodology enforces what kind of restriction?
- A . Only the external operation of a system is accessible to the tester.
- B . The internal operation of a system in only partly accessible to the tester.
- C . Only the internal operation of a system is known to the tester.
- D . The internal operation of a system is completely known to the tester.
Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?
- A . 113
- B . 69
- C . 123
- D . 161
Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?
- A . To determine who is the holder of the root account
- B . To perform a DoS
- C . To create needless SPAM
- D . To illicit a response back that will reveal information about email servers and how they treat undeliverable mail
- E . To test for virus protection
What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall if your network is comprised of Windows NT, 2000, and XP?
- A . 110
- B . 135
- C . 139
- D . 161
- E . 445
- F . 1024
What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall if your network is comprised of Windows NT, 2000, and XP?
- A . 110
- B . 135
- C . 139
- D . 161
- E . 445
- F . 1024
CompanyXYZ has asked you to assess the security of their perimeter email gateway. From your office in New York, you craft a specially formatted email message and send it across the Internet to an employee of CompanyXYZ. The employee of CompanyXYZ is aware of your test. Your email message looks like this:
From: [email protected]
To: [email protected] Subject: Test message
Date: 4/3/2017 14:37
The employee of CompanyXYZ receives your email message.
This proves that CompanyXYZ’s email gateway doesn’t prevent what?
- A . Email Masquerading
- B . Email Harvesting
- C . Email Phishing
- D . Email Spoofing
What two conditions must a digital signature meet?
- A . Has to be the same number of characters as a physical signature and must be unique.
- B . Has to be unforgeable, and has to be authentic.
- C . Must be unique and have special characters.
- D . Has to be legible and neat.
DHCP snooping is a great solution to prevent rogue DHCP servers on your network.
Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?
- A . Spanning tree
- B . Dynamic ARP Inspection (DAI)
- C . Port security
- D . Layer 2 Attack Prevention Protocol (LAPP)
Your company was hired by a small healthcare provider to perform a technical assessment on the network.
What is the best approach for discovering vulnerabilities on a Windows-based computer?
- A . Use the built-in Windows Update tool
- B . Use a scan tool like Nessus
- C . Check MITRE.org for the latest list of CVE findings
- D . Create a disk image of a clean Windows installation