Free 312-50v12 Exam Braindumps

Pass your Certified Ethical Hacker Exam (CEHv12) exam with these free Questions and Answers

Page 14 of 101
QUESTION 61

- (Exam Topic 2)
These hackers have limited or no training and know how to use only basic techniques or tools. What kind of hackers are we talking about?

  1. A. Black-Hat Hackers A
  2. B. Script Kiddies
  3. C. White-Hat Hackers
  4. D. Gray-Hat Hacker

Correct Answer: B
Script Kiddies: These hackers have limited or no training and know how to use only basictechniques or tools. Even then they may not understand any or all of what they are doing.

QUESTION 62

- (Exam Topic 3)
Which tier in the N-tier application architecture is responsible for moving and processing data between the tiers?

  1. A. Presentation tier
  2. B. Application Layer
  3. C. Logic tier
  4. D. Data tier

Correct Answer: C

QUESTION 63

- (Exam Topic 3)
Chandler works as a pen-tester in an IT-firm in New York. As a part of detecting viruses in the systems, he uses a detection method where the anti-virus executes the malicious codes on a virtual machine to simulate CPU and memory activities. Which type of virus detection method did Chandler use in this context?

  1. A. Heuristic Analysis
  2. B. Code Emulation
  3. C. Scanning
  4. D. Integrity checking

Correct Answer: B

QUESTION 64

- (Exam Topic 2)
Scenario: Joe turns on his home computer to access personal online banking. When he enters the URL www.bank.com. the website is displayed, but it prompts him to re-enter his credentials as if he has never visited the site before. When he examines the website URL closer, he finds that the site is not secure and the web address appears different. What type of attack he is experiencing?.

  1. A. Dos attack
  2. B. DHCP spoofing
  3. C. ARP cache poisoning
  4. D. DNS hijacking

Correct Answer: D

QUESTION 65

- (Exam Topic 3)
An attacker utilizes a Wi-Fi Pineapple to run an access point with a legitimate-looking SSID for a nearby business in order to capture the wireless password. What kind of attack is this?

  1. A. MAC spoofing attack
  2. B. Evil-twin attack
  3. C. War driving attack
  4. D. Phishing attack

Correct Answer: B

Page 14 of 101

Post your Comments and Discuss EC-Council 312-50v12 exam with other Community members: