EC-Council 312-50v12 Exam Questions
Certified Ethical Hacker V12 (Page 21 )

Updated On: 8-Mar-2026

Which of the following is a command line packet analyzer similar to GUI-based Wireshark?

  1. nessus
  2. tcpdump
  3. ethereal
  4. jack the ripper

Answer(s): B



DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?

  1. Spanning tree
  2. Dynamic ARP Inspection (DAI)
  3. Port security
  4. Layer 2 Attack Prevention Protocol (LAPP)

Answer(s): B



Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students.
He identified this when the IDS alerted for malware activities in the network. What should Bob do to avoid this problem?

  1. Disable unused ports in the switches
  2. Separate students in a different VLAN
  3. Use the 802.1x protocol
  4. Ask students to use the wireless network

Answer(s): C



A company’s policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department. Using Wireshark to examine the captured traffic, which command can be used as a display filter to find unencrypted file transfers?

  1. tcp.port = = 21
  2. tcp.port = 23
  3. tcp.port = = 21 | | tcp.port = =22
  4. tcp.port ! = 21

Answer(s): A



You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration? alerttcp any any -> 192.168.100.0/24 21 (msg: ““FTP on the network!””;)

  1. A firewall IPTable
  2. FTP Server rule
  3. A Router IPTable
  4. An Intrusion Detection System

Answer(s): D



Viewing page 21 of 102
Viewing questions 101 - 105 out of 504 questions



Post your Comments and Discuss EC-Council 312-50v12 exam dumps with other Community members:

312-50v12 Exam Discussions & Posts

AI Tutor