Download Certified Ethical Hacker.Marks4Sure.312-50v12.v4-0.2023-05-24.1e.266q.vcex

Download Exam

File Info

Exam Certified Ethical Hacker v12 Exam
Number 312-50v12
File Name Certified Ethical Hacker.Marks4Sure.312-50v12.v4-0.2023-05-24.1e.266q.vcex
Size 3.86 Mb
Posted May 24, 2023
Downloads 4
Download Certified Ethical Hacker.Marks4Sure.312-50v12.v4-0.2023-05-24.1e.266q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%


Demo Questions

Question 1

What is a “Collision attack” in cryptography?

  • A:  Collision attacks try to get the public key
  • B:  Collision attacks try to break the hash into three parts to get the plaintext value
  • C:  Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key
  • D:  Collision attacks try to find two inputs producing the same hash

Correct Answer: D

Question 2

Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?

  • A:  To determine who is the holder of the root account
  • B:  To perform a DoS
  • C:  To create needless SPAM
  • D:  To illicit a response back that will reveal information about email servers and how they treat undeliverable mail
  • E:  To test for virus protection

Correct Answer: D

Question 3

What is a NULL scan?

  • A:  A scan in which all flags are turned off
  • B:  A scan in which certain flags are off
  • C:  A scan in which all flags are on
  • D:  A scan in which the packet size is set to zero
  • E:  A scan with an illegal packet size

Correct Answer: A

Question 4

Which of the following program infects the system boot sector and the executable files at the same time?

  • A:  Polymorphic virus
  • B:  Stealth virus
  • C:  Multipartite Virus
  • D:  Macro virus

Correct Answer: C

Question 5

Susan has attached to her company's network. She has managed to synchronize her boss's sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory. 
What kind of attack is Susan carrying on?

  • A:  A sniffing attack
  • B:  A spoofing attack
  • C:  A man in the middle attack
  • D:  A denial of service attack

Correct Answer: C

Question 6

Which of the following is assured by the use of a hash?

  • A:  Authentication
  • B:  Confidentiality
  • C:  Availability
  • D:  Integrity

Correct Answer: D

Question 7

Email is transmitted across the Internet using the Simple Mail Transport Protocol. SMTP does not encrypt email, leaving the information in the message vulnerable to being read by an unauthorized person. SMTP can upgrade a connection between two mail servers to use TLS. Email transmitted by SMTP over TLS is encrypted. What is the name of the command used by SMTP to transmit email over TLS?


Correct Answer: D

Question 8

What did the following commands determine?


  • A:  That the Joe account has a SID of 500
  • B:  These commands demonstrate that the guest account has NOT been disabled
  • C:  These commands demonstrate that the guest account has been disabled
  • D:  That the true administrator is Joe
  • E:  Issued alone, these commands prove nothing

Correct Answer: D

Question 9

During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a Demilitarized Zone (DMZ) and a second DNS server on the internal network.
What is this type of DNS configuration commonly called?

  • A:  DynDNS 
  • B:  DNS Scheme
  • C:  DNSSEC
  • D:  Split DNS

Correct Answer: D

Question 10

Which of the following Linux commands will resolve a domain name into IP address?

  • A:  >host-t a
  • B:  >host-t ns
  • C:  >host -t soa
  • D:  >host -t AXFR

Correct Answer: A





You can buy ProfExam with a 20% discount!


Use ProfExam Simulator to open VCEX and EXAM files