Free 312-50v12 Exam Braindumps

Pass your Certified Ethical Hacker Exam (CEHv12) exam with these free Questions and Answers

Page 26 of 101
QUESTION 121

- (Exam Topic 1)
Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access.
A camera captures people walking and identifies the individuals using Steve’s approach.
After that, people must approximate their RFID badges. Both the identifications are required to open the door. In this case, we can say:

  1. A. Although the approach has two phases, it actually implements just one authentication factor
  2. B. The solution implements the two authentication factors: physical object and physical characteristic
  3. C. The solution will have a high level of false positives
  4. D. Biological motion cannot be used to identify people

Correct Answer: B

QUESTION 122

- (Exam Topic 2)
When discussing passwords, what is considered a brute force attack?

  1. A. You attempt every single possibility until you exhaust all possible combinations or discover the password
  2. B. You threaten to use the rubber hose on someone unless they reveal their password
  3. C. You load a dictionary of words into your cracking program
  4. D. You create hashes of a large number of words and compare it with the encrypted passwords
  5. E. You wait until the password expires

Correct Answer: A

QUESTION 123

- (Exam Topic 3)
What type of virus is most likely to remain undetected by antivirus software?

  1. A. Cavity virus
  2. B. Stealth virus
  3. C. File-extension virus
  4. D. Macro virus

Correct Answer: B

QUESTION 124

- (Exam Topic 2)
When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of the SYN/ACK before the connection is established. This is referred to as the "TCP three-way handshake." While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK.
How would an attacker exploit this design by launching TCP SYN attack?

  1. A. Attacker generates TCP SYN packets with random destination addresses towards a victim host
  2. B. Attacker floods TCP SYN packets with random source addresses towards a victim host
  3. C. Attacker generates TCP ACK packets with random source addresses towards a victim host
  4. D. Attacker generates TCP RST packets with random source addresses towards a victim host

Correct Answer: B

QUESTION 125

- (Exam Topic 3)
Websites and web portals that provide web services commonly use the Simple Object Access Protocol (SOAP).
Which of the following is an incorrect definition or characteristics of the protocol?

  1. A. Exchanges data between web services
  2. B. Only compatible with the application protocol HTTP
  3. C. Provides a structured model for messaging
  4. D. Based on XML

Correct Answer: B

Page 26 of 101

Post your Comments and Discuss EC-Council 312-50v12 exam with other Community members: