Exam Code: 312-50v12
Exam Questions: 576
Certified Ethical Hacker V12
Updated: 16 Apr, 2026
Viewing Page : 1 - 58
Practicing : 1 - 5 of 576 Questions
Question 1

Robin, a professional hacker, targeted an organization's network to sniff all the traffic. During this process.
Robin plugged in a rogue switch to an unused port in the LAN with a priority lower than any other switch in
the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the
network.
What is the attack performed by Robin in the above scenario?

Options :
Answer: D

Question 2

Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient’s consent, similar to email spamming?

Options :
Answer: C

Question 3

What is the minimum number of network connections in a multi homed firewall? 

Options :
Answer: A

Question 4

If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?

Options :
Answer: B

Question 5

During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a
Demilitarized Zone (DMZ) and a second DNS server on the internal network.
What is this type of DNS configuration commonly called?

Options :
Answer: D

Viewing Page : 1 - 58
Practicing : 1 - 5 of 576 Questions

© Copyrights FreePDFQuestions 2026. All Rights Reserved

We use cookies to ensure that we give you the best experience on our website (FreePDFQuestions). If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the FreePDFQuestions.