Exam Code: 312-50v12
Exam Questions: 576
Certified Ethical Hacker V12
Updated: 06 Jan, 2026
Viewing Page : 1 - 58
Practicing : 1 - 5 of 576 Questions
Question 1

Robin, a professional hacker, targeted an organization's network to sniff all the traffic. During this process.
Robin plugged in a rogue switch to an unused port in the LAN with a priority lower than any other switch in
the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the
network.
What is the attack performed by Robin in the above scenario?

Options :
Answer: D

Question 2

Peter, a Network Administrator, has come to you looking for advice on a tool that would help him perform
SNMP enquires over the network.
Which of these tools would do the SNMP enumeration he is looking for? Select the best answers.

Options :
Answer: A,B,D

Question 3

You are an ethical hacker contracted to conduct a security audit for a company. During the audit, you discover that the company's wireless network is using WEP encryption. You understand the vulnerabilities associated with WEP and plan to recommend a more secure encryption method. Which of the following would you recommend as a Suitable replacement to enhance the security of the company's wireless network?

Options :
Answer: B

Question 4

Based on the below log, which of the following sentences are true?
Mar 1, 2016, 7:33:28 AM 10.240.250.23 - 54373 10.249.253.15 - 22 tcp_ip

Options :
Answer: D

Question 5

In Trojan terminology, what is a covert channel?

312-50v12-page279-image64

Options :
Answer: A

Viewing Page : 1 - 58
Practicing : 1 - 5 of 576 Questions

© Copyrights FreePDFQuestions 2026. All Rights Reserved

We use cookies to ensure that we give you the best experience on our website (FreePDFQuestions). If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the FreePDFQuestions.