Download ECCouncil.312-50v12.Marks4Sure.2023-09-07.504q.vcex

Download Exam

File Info

Exam Certified Ethical Hacker v12 Exam
Number 312-50v12
File Name ECCouncil.312-50v12.Marks4Sure.2023-09-07.504q.vcex
Size 7 MB
Posted Sep 07, 2023
Downloads: 2
Download ECCouncil.312-50v12.Marks4Sure.2023-09-07.504q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%

Demo Questions

Question 1

What is a “Collision attack” in cryptography?

  1.  Collision attacks try to get the public key
  2.  Collision attacks try to break the hash into three parts to get the plaintext value
  3.  Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key
  4.  Collision attacks try to find two inputs producing the same hash
Correct answer: D

Question 2

What is the proper response for a NULL scan if the port is open?

  1.  SYN
  2.  ACK
  3.  FIN 
  4.  PSH
  5.  RST
  6.  No response
Correct answer: F

Question 3

Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?

  1.  To determine who is the holder of the root account
  2.  To perform a DoS
  3.  To create needless SPAM
  4.  To illicit a response back that will reveal information about email servers and how they treat undeliverable mail
  5.  To test for virus protection
Correct answer: D

Question 4

What is a NULL scan?

  1.  A scan in which all flags are turned off
  2.  A scan in which certain flags are off
  3.  A scan in which all flags are on
  4.  A scan in which the packet size is set to zero
  5.  A scan with an illegal packet size
Correct answer: A

Question 5

Which of the following program infects the system boot sector and the executable files at the same time?

  1.  Polymorphic virus
  2.  Stealth virus
  3.  Multipartite Virus
  4.  Macro virus
Correct answer: C

Question 6

The collection of potentially actionable, overt, and publicly available information is known as

  1.  Open-source intelligence
  2.  Real intelligence
  3.  Social intelligence
  4.  Human intelligence
Correct answer: A

Question 7

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?

  1.  ESP transport mode
  2.  ESP confidential
  3.  AH permiscuous
  4.  AH Tunnel mode
Correct answer: A

Question 8

Susan has attached to her company's network. She has managed to synchronize her boss's sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory. 
What kind of attack is Susan carrying on?

  1.  A sniffing attack
  2.  A spoofing attack
  3.  A man in the middle attack
  4.  A denial of service attack
Correct answer: C

Question 9

An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections.
When users accessed any page, the applet ran and exploited many machines. Which one of the following tools the hacker probably used to inject HTML code?

  1.  Wireshark
  2.  Ettercap
  3.  Aircrack-ng
  4.  Tcpdump
Correct answer: B

Question 10

Which of the following is assured by the use of a hash?

  1.  Authentication
  2.  Confidentiality
  3.  Availability
  4.  Integrity
Correct answer: D





You can buy ProfExam with a 20% discount!


Use ProfExam Simulator to open VCEX files