Free 312-50v12 Exam Braindumps

Pass your Certified Ethical Hacker Exam (CEHv12) exam with these free Questions and Answers

Page 24 of 101
QUESTION 111

- (Exam Topic 3)
Jack, a disgruntled ex-employee of Incalsol Ltd., decided to inject fileless malware into Incalsol's systems. To deliver the malware, he used the current employees' email IDs to send fraudulent emails embedded with malicious links that seem to be legitimate. When a victim employee clicks on the link, they are directed to a fraudulent website that automatically loads Flash and triggers the exploit. What is the technique used byjack to launch the fileless malware on the target systems?

  1. A. In-memory exploits
  2. B. Phishing
  3. C. Legitimate applications
  4. D. Script-based injection

Correct Answer: B

QUESTION 112

- (Exam Topic 3)
Which of the following statements is TRUE?

  1. A. Packet Sniffers operate on the Layer 1 of the OSI model.
  2. B. Packet Sniffers operate on Layer 2 of the OSI model.
  3. C. Packet Sniffers operate on both Layer 2 & Layer 3 of the OSI model.
  4. D. Packet Sniffers operate on Layer 3 of the OSI model.

Correct Answer: B

QUESTION 113

- (Exam Topic 1)
When you are getting information about a web server, it is very important to know the HTTP Methods (GET, POST, HEAD, PUT, DELETE, TRACE) that are available because there are two critical methods (PUT and DELETE). PUT can upload a file to the server and DELETE can delete a file from the server. You can detect all these methods (GET, POST, HEAD, DELETE, PUT, TRACE) using NMAP script engine. What Nmap script will help you with this task?

  1. A. http-methods
  2. B. http enum
  3. C. http-headers
  4. D. http-git

Correct Answer: A

QUESTION 114

- (Exam Topic 2)
Susan, a software developer, wants her web API to update other applications with the latest information. For this purpose, she uses a user-defined HTTP tailback or push APIs that are raised based on trigger events: when invoked, this feature supplies data to other applications so that users can instantly receive real-time Information.
Which of the following techniques is employed by Susan?

  1. A. web shells
  2. B. Webhooks
  3. C. REST API
  4. D. SOAP API

Correct Answer: B
Webhooks are one of a few ways internet applications will communicate with one another.
It allows you to send real-time data from one application to another whenever a given event happens.
For example, let’s say you’ve created an application using the Foursquare API that tracks when people check into your restaurant. You ideally wish to be able to greet customers by name and provide a complimentary drink when they check in.
What a webhook will is notify you any time someone checks in, therefore you’d be able to run any processes that you simply had in your application once this event is triggered.
The data is then sent over the web from the application wherever the event originally occurred, to the receiving application that handles the data.
Here’s a visual representation of what that looks like:312-50v12 dumps exhibit
A webhook url is provided by the receiving application, and acts as a phone number that the other application will call once an event happens.
Only it’s more complicated than a phone number, because data about the event is shipped to the webhook url in either JSON or XML format. this is known as the “payload.”
Here’s an example of what a webhook url looks like with the payload it’s carrying:
312-50v12 dumps exhibit
What are Webhooks? Webhooks are user-defined HTTP callback or push APIs that are raised based on events triggered, such as comment received on a post and pushing code to the registry. A webhook allows an application to update other applications with the latest information. Once invoked, it supplies data to the other applications, which means that users instantly receive real-time information. Webhooks are sometimes called “Reverse APIs” as they provide what is required for API specification, and the developer should create an API to use a webhook. A webhook is an API concept that is also used to send text messages and notifications to mobile numbers or email addresses from an application when a specific event is triggered. For instance, if you search for something in the online store and the required item is out of stock, you click on the “Notify me” bar to get an alert from the application when that item is available for purchase. These notifications from the applications are usually sent through webhooks.

QUESTION 115

- (Exam Topic 1)
One of your team members has asked you to analyze the following SOA record.
What is the TTL? Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.)

  1. A. 200303028
  2. B. 3600
  3. C. 604800
  4. D. 2400
  5. E. 60
  6. F. 4800

Correct Answer: D

Page 24 of 101

Post your Comments and Discuss EC-Council 312-50v12 exam with other Community members: