Download Certified Ethical Hacker v12 Exam.312-50v12.ExamTopics.2025-06-05.317q.vcex

Vendor: ECCouncil
Exam Code: 312-50v12
Exam Name: Certified Ethical Hacker v12 Exam
Date: Jun 05, 2025
File Size: 257 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
In this form of encryption algorithm, every individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?
  1. IDEA
  2. Triple Data Encryption Standard
  3. AES
  4. MD5 encryption algorithm
Correct answer: B
Question 2
You are a penetration tester working to test the user awareness of the employees of the client XYZ. You harvested two employees’ emails from some public sources and are creating a client-side backdoor to send it to the employees via email.
Which stage of the cyber kill chain are you at?
  1. Reconnaissance
  2. Weaponization
  3. Command and control
  4. Exploitation
Correct answer: B
Question 3
Emily, an extrovert obsessed with social media, posts a large amount of private information, photographs, and location tags of recently visited places. Realizing this, James, a professional hacker, targets Emily and her acquaintances, conducts a location search to detect their geolocation by using an automated tool, and gathers information to perform other sophisticated attacks.
What is the tool employed by James in the above scenario?
  1. ophcrack
  2. VisualRoute
  3. Hootsuite
  4. HULK
Correct answer: C
Question 4
Alice needs to send a confidential document to her coworker, Bryan. Their company has public key infrastructure set up. Therefore, Alice both encrypts the message and digitally signs it. Alice uses _______________ to encrypt the message, and Bryan uses _______________ to confirm the digital signature.
  1. Bryan’s public key; Bryan’s public key
  2. Alice’s public key; Alice’s public key
  3. Bryan’s private key; Alice’s public key
  4. Bryan’s public key; Alice’s public key
Correct answer: D
Question 5
What is the file that determines the basic configuration (specifically activities, services, broadcast receivers, etc.) in an Android application?
  1. AndroidManifest.xml
  2. classes.dex
  3. APK.info
  4. resources.asrc
Correct answer: A
Question 6
Mason, a professional hacker, targets an organization and spreads Emotet malware through malicious script. After infecting the victim's device, Mason further used Emotet to spread the infection across local networks and beyond to compromise as many machines as possible. In this process, he used a tool, which is a self-extracting RAR file, to retrieve information related to network resources such as writable share drives.
What is the tool employed by Mason in the above scenario?
  1. NetPass.exe
  2. Outlook scraper
  3. WebBrowserPassView
  4. Credential enumerator
Correct answer: D
Question 7
Which of the following Bluetooth hacking techniques refers to the theft of information from a wireless device through Bluetooth?
  1. Bluesmacking
  2. Bluesnarfing
  3. Bluejacking
  4. Bluebugging
Correct answer: B
Question 8
While browsing his Facebook feed, Matt sees a picture one of his friends posted with the caption, “Learn more about your friends!”, as well as a number of personal questions. Matt is suspicious and texts his friend, who confirms that he did indeed post it. With assurance that the post is legitimate, Matt responds to the questions on the post. A few days later, Matt’s bank account has been accessed, and the password has been changed.
What most likely happened?
  1. Matt inadvertently provided the answers to his security questions when responding to the post.
  2. Matt inadvertently provided his password when responding to the post.
  3. Matt’s computer was infected with a keylogger.
  4. Matt’s bank-account login information was brute forced.
Correct answer: A
Question 9
Attacker Simon targeted the communication network of an organization and disabled the security controls of NetNTLMv1 by modifying the values of LMCompatibilityLevel, NTLMMinClientSec, and RestrictSendingNTLMTraffic. He then extracted all the non-network logon tokens from all the active processes to masquerade as a legitimate user to launch further attacks.
What is the type of attack performed by Simon?
  1. Combinator attack
  2. Dictionary attack
  3. Rainbow table attack
  4. Internal monologue attack
Correct answer: D
Question 10
Steve, an attacker, created a fake profile on a social media website and sent a request to Stella. Stella was enthralled by Steve’s profile picture and the description given for his profile, and she initiated a conversation with him soon after accepting the request. After a few days, Steve started asking about her company details and eventually gathered all the essential information regarding her company.
What is the social engineering technique Steve employed in the above scenario?
  1. Baiting
  2. Piggybacking
  3. Diversion theft
  4. Honey trap
Correct answer: D
Question 11
Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as?
  1. Exploration
  2. Investigation
  3. Reconnaissance
  4. Enumeration
Correct answer: C
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!