Certified Ethical Hacker v12 Exam

Here you have the best EC-Council 312-50v12 practice exam questions

  • You have 309 total questions to study from
  • Each page has 5 questions, making a total of 62 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on November 17, 2024
Question 1 of 309

In this form of encryption algorithm, every individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?

    Correct Answer: B

    The encryption algorithm described uses three keys, each 56 bits long, to encrypt 64-bit blocks of data. This description corresponds to the Triple Data Encryption Standard (Triple DES or 3DES). Triple DES was designed to increase the security of DES by applying the DES algorithm three times to each data block. The other options, such as IDEA, AES, and MD5 encryption algorithm, do not fit this specific description: IDEA uses a smaller block size and different key structure, AES uses larger block sizes (128, 192, or 256 bits), and MD5 is a hashing algorithm, not an encryption algorithm.

Question 2 of 309

John is investigating web-application firewall logs and observers that someone is attempting to inject the following:

What type of attack is this?

    Correct Answer: B

    The code provided attempts to write a value to the 11th position (index 10) of a 10-element array (indexed 0-9), which constitutes a buffer overflow attack. This kind of attack exploits a program's lack of bounds checking on buffer operations, potentially enabling the attacker to manipulate the program's behavior or execute arbitrary code by overwriting adjacent memory.

Question 3 of 309

John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization.

Which of the following attack techniques is used by John?

    Correct Answer: D

    John's actions indicate the use of an Advanced Persistent Threat (APT). An APT involves an unauthorized entity gaining access to a network and remaining undetected over an extended period to gather sensitive information without causing immediate damage. This fits the description of John's prolonged, undetected presence and data exfiltration within the target network.

Question 4 of 309

You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?

    Correct Answer: C

    To scan common ports with the least amount of noise in order to evade IDS, the command 'nmap -sT -O -T0' is the best choice. The -sT option stands for a TCP connect scan, which is less stealthy than some other options but is more universally usable. The -O option enables OS detection, which is not directly related to noise, but could be useful for gaining additional information. Most importantly, the -T0 option sets the timing template to 'paranoid,' which is designed for the slowest and most stealthy scans possible, minimizing the risk of detection by an intrusion detection system (IDS).

Question 5 of 309

This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as GCMP-256, HMAC-SHA384, and ECDSA using a 384-bit elliptic curve.

Which is this wireless security protocol?

    Correct Answer: B

    The wireless security protocol being described is WPA3-Enterprise. WPA3-Enterprise supports 192-bit minimum-strength security protocols and advanced cryptographic tools like GCMP-256, HMAC-SHA384, and ECDSA using a 384-bit elliptic curve, which are not supported at the same level by other protocols such as WPA2 or WPA3-Personal. This makes WPA3-Enterprise the correct answer for providing robust security in enterprise environments.