Eccouncil 312-50v12 practice test

certified ethical hacker v12 exam

Last exam update: Nov 27 ,2024
Page 1 out of 31. Viewing questions 1-10 out of 309

Question 1

Alice needs to send a confidential document to her coworker, Bryan. Their company has public key infrastructure set up. Therefore, Alice both encrypts the message and digitally signs it. Alice uses _______________ to encrypt the message, and Bryan uses _______________ to confirm the digital signature.

  • A. Bryans public key; Bryans public key
  • B. Alices public key; Alices public key
  • C. Bryans private key; Alices public key
  • D. Bryans public key; Alices public key
Mark Question:
Answer:

d

User Votes:
A
50%
B
50%
C
50%
D 3 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Given below are different steps involved in the vulnerability-management life cycle.

1) Remediation
2) Identify assets and create a baseline
3) Verification
4) Monitor
5) Vulnerability scan
6) Risk assessment

Identify the correct sequence of steps involved in vulnerability management.

  • A. 2 5 6 1 3 4
  • B. 2 4 5 3 6 1
  • C. 2 1 5 6 4 3
  • D. 1 2 3 4 5 6
Mark Question:
Answer:

a

User Votes:
A 1 votes
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Ricardo has discovered the username for an application in his targets environment. As he has a limited amount of time, he decides to attempt to use a list of common passwords he found on the Internet. He compiles them into a list and then feeds that list as an argument into his password-cracking application.
What type of attack is Ricardo performing?

  • A. Brute force
  • B. Known plaintext
  • C. Dictionary
  • D. Password spraying
Mark Question:
Answer:

c

User Votes:
A
50%
B
50%
C 1 votes
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Andrew is an Ethical Hacker who was assigned the task of discovering all the active devices hidden by a restrictive firewall in the IPv4 range in a given target network.
Which of the following host discovery techniques must he use to perform the given task?

  • A. UDP scan
  • B. ARP ping scan
  • C. ACK flag probe scan
  • D. TCP Maimon scan
Mark Question:
Answer:

c

User Votes:
A
50%
B 1 votes
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
betewow473
1 month ago

given in CEH book


Question 5

A Certified Ethical Hacker (CEH) is given the task to perform an LDAP enumeration on a target system. The system is secured and accepts connections only on secure LDAP. The CEH uses Python for the enumeration process. After successfully installing LDAP and establishing a connection with the target, he attempts to fetch details like the domain name and naming context but is unable to receive the expected response. Considering the circumstances, which of the following is the most plausible reason for this situation?

  • A. The system failed to establish a connection due to an incorrect port number.
  • B. The enumeration process was blocked by the target system's intrusion detection system.
  • C. The secure LDAP connection was not properly initialized due to a lack of 'use_ssl = True' in the server object creation.
  • D. The Python version installed on the CEH's machine is incompatible with the Idap3 library.
Mark Question:
Answer:

c

User Votes:
A
50%
B
50%
C 1 votes
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Johnson, an attacker, performed online research for the contact details of reputed cybersecurity firms. He found the contact number of sibertech.org and dialed the number, claiming himself to represent a technical support team from a vendor. He warned that a specific server is about to be compromised and requested sibertech.org to follow the provided instructions. Consequently, he prompted the victim to execute unusual commands and install malicious files, which were then used to collect and pass critical information to Johnsons machine.
What is the social engineering technique Steve employed in the above scenario?

  • A. Diversion theft
  • B. Quid pro quo
  • C. Elicitation
  • D. Phishing
Mark Question:
Answer:

c

User Votes:
A
50%
B 1 votes
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
betewow473
1 month ago

given in CEH book


Question 7

You have been given the responsibility to ensure the security of your school's web server. As a step towards this, you plan to restrict unnecessary services running on the server. In the context of web server security, why is this step considered important?

  • A. Unnecessary services eat up server memory; save memory resources.
  • B. Unnecessary services could contain vulnerabilities; minimize the attack surface.
  • C. Unnecessary services reveal server software; hide software details.
  • D. Unnecessary services slow down the server; optimize server speed.
Mark Question:
Answer:

b

User Votes:
A
50%
B 1 votes
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Harper, a software engineer, is developing an email application. To ensure the confidentiality of email messages, Harper uses a symmetric-key block cipher having a classical 12- or 16-round Feistel network with a block size of 64 bits for encryption, which includes large 8 32-bit S-boxes (S1, S2, S3, S4) based on bent functions, modular addition and subtraction, key-dependent rotation, and XOR operations. This cipher also uses a masking key (Km1) and a rotation key (Kr1) for performing its functions.

What is the algorithm employed by Harper to secure the email messages?

  • A. CAST-128
  • B. AES
  • C. GOST block cipher
  • D. DES
Mark Question:
Answer:

a

User Votes:
A 1 votes
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

A DDoS attack is performed at layer7 to take down web infrastructure. Partial HTTP requests are sent to the web infrastructure or applications. Upon receiving a partial request, the target servers opens multiple connections and keeps waiting for the requests to complete.
Which attack is being described here?

  • A. Desynchronization
  • B. Slowloris attack
  • C. Session splicing
  • D. Phlashing
Mark Question:
Answer:

b

User Votes:
A
50%
B 1 votes
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

A malicious user has acquired a Ticket Granting Service from the domain controller using a valid user's Ticket Granting Ticket in a Kerberoasting attack. He exhorted the TGS tickets from memory for offline cracking. But the attacker was stopped before he could complete his attack. The system administrator needs to investigate and remediate the potential breach. What should be the immediate step the system administrator takes?

  • A. Perform a system reboot to clear the memory
  • B. Delete the compromised user's account
  • C. Change the NTLM password hash used to encrypt the ST
  • D. Invalidate the TGS the attacker acquired
Mark Question:
Answer:

d

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2