EC-Council 312-50v12 Exam Questions
Certified Ethical Hacker V12 (Page 16 )

Updated On: 8-Mar-2026

A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer’s software and hardware without the owner’s permission. Their intention can either be to simply gain knowledge or to illegally make changes.
Which of the following class of hacker refers to an individual who works both offensively and defensively at various times?

  1. White Hat
  2. Suicide Hacker
  3. Gray Hat
  4. Black Hat

Answer(s): C



During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a Demilitarized Zone (DMZ) and a second DNS server on the internal network.

What is this type of DNS configuration commonly called?

  1. DynDNS
  2. DNS Scheme
  3. DNSSEC
  4. Split DNS

Answer(s): D



What kind of detection techniques is being used in antivirus software that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it’s made on the provider’s environment?

  1. Behavioral based
  2. Heuristics based
  3. Honeypot based
  4. Cloud based

Answer(s): D



Which of the following tools is used to analyze the files produced by several packet-capture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?

  1. tcptrace
  2. Nessus
  3. OpenVAS
  4. tcptraceroute

Answer(s): A



What is the way to decide how a packet will move from an untrusted outside host to a protected inside that is behind a firewall, which permits the hacker to determine which ports are open and if the packets can pass through the packet-filtering of the firewall?

  1. Session hijacking
  2. Firewalking
  3. Man-in-the middle attack
  4. Network sniffing

Answer(s): B



Viewing page 16 of 102
Viewing questions 76 - 80 out of 504 questions



Post your Comments and Discuss EC-Council 312-50v12 exam dumps with other Community members:

312-50v12 Exam Discussions & Posts

AI Tutor