EC-Council 312-50v12 Exam Questions
Certified Ethical Hacker V12 (Page 19 )

Updated On: 8-Mar-2026

Which regulation defines security and privacy controls for Federal information systems and organizations?

  1. HIPAA
  2. EU Safe Harbor
  3. PCI-DSS
  4. NIST-800-53

Answer(s): D



What is a “Collision attack” in cryptography?

  1. Collision attacks try to get the public key
  2. Collision attacks try to break the hash into three parts to get the plaintext value
  3. Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key
  4. Collision attacks try to find two inputs producing the same hash

Answer(s): D



Which of the following tools can be used for passive OS fingerprinting?

  1. nmap
  2. tcpdump
  3. tracert
  4. ping

Answer(s): B



Which of the following describes the characteristics of a Boot Sector Virus?

  1. Modifies directory table entries so that directory entries point to the virus code instead of the actual program.
  2. Moves the MBR to another location on the RAM and copies itself to the original location of the MBR.
  3. Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR.
  4. Overwrites the original MBR and only executes the new virus code.

Answer(s): C



Your company was hired by a small healthcare provider to perform a technical assessment on the network. What is the best approach for discovering vulnerabilities on a Windows-based computer?

  1. Use the built-in Windows Update tool
  2. Use a scan tool like Nessus
  3. Check MITRE.org for the latest list of CVE findings
  4. Create a disk image of a clean Windows installation

Answer(s): B



Viewing page 19 of 102
Viewing questions 91 - 95 out of 504 questions



Post your Comments and Discuss EC-Council 312-50v12 exam dumps with other Community members:

312-50v12 Exam Discussions & Posts

AI Tutor