Free 312-50v12 Exam Braindumps

Pass your Certified Ethical Hacker Exam (CEHv12) exam with these free Questions and Answers

Page 3 of 101
QUESTION 6

- (Exam Topic 3)
An attacker decided to crack the passwords used by industrial control systems. In this process, he employed a loop strategy to recover these passwords. He used one character at a time to check whether the first character entered is correct; if so, he continued the loop for consecutive characters. If not, he terminated the loop. Furthermore, the attacker checked how much time the device took to finish one complete password authentication process, through which he deduced how many characters entered are correct.
What is the attack technique employed by the attacker to crack the passwords of the industrial control systems?

  1. A. Side-channel attack
  2. B. Denial-of-service attack
  3. C. HMI-based attack
  4. D. Buffer overflow attack

Correct Answer: C

QUESTION 7

- (Exam Topic 3)
A "Server-Side Includes" attack refers to the exploitation of a web application by injecting scripts in HTML pages or executing arbitrary code remotely.
Which web-page file type, if it exists on the web server, is a strong indication that the server is vulnerable to this kind of attack?

  1. A. .stm
  2. B. .html
  3. C. .rss
  4. D. .cms

Correct Answer: A

QUESTION 8

- (Exam Topic 2)
Matthew, a black hat, has managed to open a meterpreter session to one of the kiosk machines in Evil Corp’s lobby. He checks his current SID, which is S-1-5-21-1223352397-1872883824-861252104-501. What needs to happen before Matthew has full administrator access?

  1. A. He must perform privilege escalation.
  2. B. He needs to disable antivirus protection.
  3. C. He needs to gain physical access.
  4. D. He already has admin privileges, as shown by the “501” at the end of the SID.

Correct Answer: A

QUESTION 9

- (Exam Topic 3)
John, a professional hacker, targeted CyberSol Inc., an MNC. He decided to discover the loT devices connected in the target network that are using default credentials and are vulnerable to various hijacking attacks. For this purpose, he used an automated tool to scan the target network for specific types of loT devices and detect whether they are using the default, factory-set credentials. What is the tool employed by John in the above scenario?

  1. A. loTSeeker
  2. B. loT Inspector
  3. C. AT&T loT Platform
  4. D. Azure loT Central

Correct Answer: A

QUESTION 10

- (Exam Topic 3)
A Security Engineer at a medium-sized accounting firm has been tasked with discovering how much information can be obtained from the firm’s public facing web servers. The engineer decides to start by using netcat to port 80.
The engineer receives this output: HTTP/1.1 200 OK
Server: Microsoft-IIS/6
Expires: Tue, 17 Jan 2011 01:41:33 GMT
Date: Mon, 16 Jan 2011 01:41:33 GMT
Content-Type: text/html Accept-Ranges: bytes
Last Modified: Wed, 28 Dec 2010 15:32:21 GMT ETag:“b0aac0542e25c31:89d”
Content-Length: 7369
Which of the following is an example of what the engineer performed?

  1. A. Banner grabbing
  2. B. SQL injection
  3. C. Whois database query
  4. D. Cross-site scripting

Correct Answer: A

Page 3 of 101

Post your Comments and Discuss EC-Council 312-50v12 exam with other Community members: