ECCouncil 312-50v12 - Certified Ethical Hacker v12 Exam Exam

Page:    1 / 62   
Total 309 questions

In this form of encryption algorithm, every individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?

  • A. IDEA
  • B. Triple Data Encryption Standard
  • C. AES
  • D. MD5 encryption algorithm


Answer : B

John is investigating web-application firewall logs and observers that someone is attempting to inject the following:

What type of attack is this?

  • A. SQL injection
  • B. Buffer overflow
  • C. CSRF
  • D. XSS


Answer : B

John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization.
Which of the following attack techniques is used by John?

  • A. Insider threat
  • B. Diversion theft
  • C. Spear-phishing sites
  • D. Advanced persistent threat


Answer : D

You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?

  • A. nmap -A - Pn
  • B. nmap -sP -p-65535 -T5
  • C. nmap -sT -O -T0
  • D. nmap -A --host-timeout 99 -T1


Answer : C

This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as GCMP-256, HMAC-SHA384, and ECDSA using a 384-bit elliptic curve.
Which is this wireless security protocol?

  • A. WPA3-Personal
  • B. WPA3-Enterprise
  • C. WPA2-Enterprise
  • D. WPA2-Personal


Answer : B

Page:    1 / 62   
Total 309 questions