EC-Council 312-50v12 Exam
Certified Ethical Hacker V12 (Page 7 )

Updated On: 12-Feb-2026

You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?

  1. nmap -A - Pn
  2. nmap -sP -p-65535 -T5
  3. nmap -sT -O -T0
  4. nmap -A --host-timeout 99 -T1

Answer(s): C



What does the –oX flag do in an Nmap scan?

  1. Perform an eXpress scan
  2. Output the results in truncated format to the screen
  3. Output the results in XML format to a file
  4. Perform an Xmas scan

Answer(s): C



A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?

  1. Perform a vulnerability scan of the system.
  2. Determine the impact of enabling the audit feature.
  3. Perform a cost/benefit analysis of the audit feature.
  4. Allocate funds for staffing of audit log review.

Answer(s): B



Which Intrusion Detection System is best applicable for large environments where critical assets on the network need extra scrutiny and is ideal for observing sensitive network segments?

  1. Honeypots
  2. Firewalls
  3. Network-based intrusion detection system (NIDS)
  4. Host-based intrusion detection system (HIDS)

Answer(s): C



The collection of potentially actionable, overt, and publicly available information is known as

  1. Open-source intelligence
  2. Real intelligence
  3. Social intelligence
  4. Human intelligence

Answer(s): A






Post your Comments and Discuss EC-Council 312-50v12 exam prep with other Community members:

Join the 312-50v12 Discussion