EC-Council 312-50v12 Exam Questions
Certified Ethical Hacker V12 (Page 13 )

Updated On: 5-Mar-2026

In the field of cryptanalysis, what is meant by a “rubber-hose” attack?

  1. Forcing the targeted keystream through a hardware-accelerated device such as an ASIC.
  2. A backdoor placed into a cryptographic algorithm by its creator.
  3. Extraction of cryptographic secrets through coercion or torture.
  4. Attempting to decrypt ciphertext by making logical assumptions about the contents of the original plaintext.

Answer(s): C



You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in yournetwork, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine. What Wireshark filter will show the connections from the snort machine to kiwi syslog machine?

  1. tcp.srcport= = 514 &&ip.src= = 192.168.0.99
  2. tcp.srcport= = 514 &&ip.src= = 192.168.150
  3. tcp.dstport= = 514 &&ip.dst= = 192.168.0.99
  4. tcp.dstport= = 514 &&ip.dst= = 192.168.0.150

Answer(s): D



What two conditions must a digital signature meet?

  1. Has to be the same number of characters as a physical signature and must be unique.
  2. Has to be unforgeable, and has to be authentic.
  3. Must be unique and have special characters.
  4. Has to be legible and neat.

Answer(s): B



A company’s security policy states that all Web browsers must automatically delete their HTTP browser cookies upon terminating. What sort of security breach is this policy attempting to mitigate?

  1. Attempts by attackers to access the user and password information stored in the company’s SQL database.
  2. Attempts by attackers to access Web sites that trust the Web browser user by stealing the user’s authentication credentials.
  3. Attempts by attackers to access passwords stored on the user’s computer without the user’s knowledge.
  4. Attempts by attackers to determine the user’s Web browser usage patterns, including when sites were visited and for how long.

Answer(s): B



What is correct about digital signatures?

  1. A digital signature cannot be moved from one signed document to another because it is the hash of the original document encrypted with the private key of the signing party.
  2. Digital signatures may be used in different documents of the same type.
  3. A digital signature cannot be moved from one signed document to another because it is a plain hash of the document content.
  4. Digital signatures are issued once for each user and can be used everywhere until they expire.

Answer(s): A



Viewing page 13 of 102
Viewing questions 61 - 65 out of 504 questions



Post your Comments and Discuss EC-Council 312-50v12 exam dumps with other Community members:

312-50v12 Exam Discussions & Posts

AI Tutor