EC-Council 312-50v12 Exam
Certified Ethical Hacker V12 (Page 3 )

Updated On: 12-Feb-2026

Session splicing is an IDS evasion technique in which an attacker delivers data in multiple, small sized packets to the target computer, making it very difficult for an IDS to detect the attack signatures. Which tool can be used to perform session splicing attacks?

  1. tcpsplice
  2. Burp
  3. Hydra
  4. Whisker

Answer(s): D



You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly.
What is the best Nmap command you will use?

  1. nmap -T4 -q 10.10.0.0/24
  2. nmap -T4 -F 10.10.0.0/24
  3. nmap -T4 -r 10.10.1.0/24
  4. nmap -T4 -O 10.10.0.0/24

Answer(s): B



As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing.
What document describes the specifics of the testing, the associated violations, and essentially protects both the organization’s interest and your liabilities as a tester?

  1. Service Level Agreement
  2. Project Scope
  3. Rules of Engagement
  4. Non-Disclosure Agreement

Answer(s): C



Which of the following is the BEST way to defend against network sniffing?

  1. Using encryption protocols to secure network communications
  2. Register all machines MAC Address in a Centralized Database
  3. Use Static IP Address
  4. Restrict Physical Access to Server Rooms hosting Critical Servers

Answer(s): A



Which of the following is the least-likely physical characteristic to be used in biometric control that supports a large company?

  1. Iris patterns
  2. Voice
  3. Height and Weight
  4. Fingerprints

Answer(s): C






Post your Comments and Discuss EC-Council 312-50v12 exam prep with other Community members:

Join the 312-50v12 Discussion