Free 312-50v12 Exam Braindumps

Pass your Certified Ethical Hacker Exam (CEHv12) exam with these free Questions and Answers

Page 27 of 101
QUESTION 126

- (Exam Topic 1)
Which of the following tools can be used to perform a zone transfer?

  1. A. NSLookup
  2. B. Finger
  3. C. Dig
  4. D. Sam Spade
  5. E. Host
  6. F. Netcat
  7. G. Neotrace

Correct Answer: ACDE

QUESTION 127

- (Exam Topic 3)
The security team of Debry Inc. decided to upgrade Wi-Fi security to thwart attacks such as dictionary attacks and key recovery attacks. For this purpose, the security team started implementing cutting-edge technology that uses a modern key establishment protocol called the simultaneous authentication of equals (SAE), also known as dragonfly key exchange, which replaces the PSK concept. What is the Wi-Fi encryption technology implemented by Debry Inc.?

  1. A. WEP
  2. B. WPA
  3. C. WPA2
  4. D. WPA3

Correct Answer: C

QUESTION 128

- (Exam Topic 3)
This type of injection attack does not show any error message. It is difficult to exploit as it returns information when the application is given SQL payloads that elicit a true or false response from the server. By observing the response, an attacker can extract sensitive information. What type of attack is this?

  1. A. Time-based SQL injection
  2. B. Union SQL injection
  3. C. Error-based SQL injection
  4. D. Blind SQL injection

Correct Answer: D

QUESTION 129

- (Exam Topic 3)
What would you enter if you wanted to perform a stealth scan using Nmap?

  1. A. nmap -sM
  2. B. nmap -sU
  3. C. nmap -sS
  4. D. nmap -sT

Correct Answer: C

QUESTION 130

- (Exam Topic 2)
Attacker Steve targeted an organization's network with the aim of redirecting the company's web traffic to another malicious website. To achieve this goal, Steve performed DNS cache poisoning by exploiting the vulnerabilities In the DNS server software and modified the original IP address of the target website to that of a fake website. What is the technique employed by Steve to gather information for identity theft?

  1. A. Pretexting
  2. B. Pharming
  3. C. Wardriving
  4. D. Skimming

Correct Answer: B
A pharming attacker tries to send a web site’s traffic to a faux website controlled by the offender, typically for the aim of collection sensitive data from victims or putting in malware on their machines. Attacker tend to specialize in making look-alike ecommerce and digital banking websites to reap credentials and payment card data.
Though they share similar goals, pharming uses a special technique from phishing. “Pharming attacker are targeted on manipulating a system, instead of tricking people into reaching to a dangerous web site,” explains David Emm, principal security man of science at Kaspersky. “When either a phishing or pharming attacker is completed by a criminal, they need a similar driving issue to induce victims onto a corrupt location, however the mechanisms during which this is often undertaken are completely different.”

Page 27 of 101

Post your Comments and Discuss EC-Council 312-50v12 exam with other Community members: