EC-Council 312-50v12 Exam
Certified Ethical Hacker V12 (Page 4 )

Updated On: 12-Feb-2026

Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end-to-end encryption of the connection?

  1. SFTP
  2. Ipsec
  3. SSL
  4. FTPS

Answer(s): B



To reach a bank web site, the traffic from workstations must pass through a firewall. You have been asked to review the firewall configuration to ensure that workstations in network 10.10.10.0/24 can only reach the bankweb site 10.20.20.1 using https. Which of the following firewall rules meets this requirement?

  1. if (source matches 10.10.10.0/24 and destination matches 10.20.20.1 and port matches 443) then permit
  2. if (source matches 10.10.10.0/24 and destination matches 10.20.20.1 and port matches 80 or 443) then permit
  3. if (source matches 10.20.20.1 and destination matches 10.10.10.0/24 and port matches 443) then permit
  4. if (source matches 10.10.10.0 and destination matches 10.20.20.1 and port matches 443) then permit

Answer(s): A



Jim’s company regularly performs backups of their critical servers. But the company cannot afford to send backup tapes to an off-site vendor for long-term storage and archiving. Instead, Jim’s company keeps the backup tapes in a safe in the office. Jim’s company is audited each year, and the results from this year’s audit show a risk because backup tapes are not stored off-site. The Manager of Information Technology has a plan to take the backup tapes home with him and wants to know what two things he can do to secure the backup tapes while in transit?

  1. Encrypt the backup tapes and transport them in a lock box.
  2. Degauss the backup tapes and transport them in a lock box.
  3. Hash the backup tapes and transport them in a lock box.
  4. Encrypt the backup tapes and use a courier to transport them.

Answer(s): A



You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible. But they are not accessible when you try using the URL.
What may be the problem?

  1. Traffic is Blocked on UDP Port 53
  2. Traffic is Blocked on TCP Port 80
  3. Traffic is Blocked on TCP Port 54
  4. Traffic is Blocked on UDP Port 80

Answer(s): A



Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a Linux platform?

  1. Kismet
  2. Abel
  3. Netstumbler
  4. Nessus

Answer(s): A






Post your Comments and Discuss EC-Council 312-50v12 exam prep with other Community members:

Join the 312-50v12 Discussion