Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

ECCouncil 312-50v12 Exam Actual Questions

The questions for 312-50v12 were last updated on Feb. 15, 2024.
  • Viewing page 1 out of 50 pages.
  • Viewing questions 1-5 out of 249 questions

Topic 1 - Exam A

Question #1 Topic 1

In this form of encryption algorithm, every individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?

  • A. IDEA
  • B. Triple Data Encryption Standard
  • C. AES
  • D. MD5 encryption algorithm
Reveal Solution Hide Solution   Discussion   47

Correct Answer: B 🗳️

Question #2 Topic 1

John is investigating web-application firewall logs and observers that someone is attempting to inject the following:

What type of attack is this?

  • A. SQL injection
  • B. Buffer overflow
  • C. CSRF
  • D. XSS
Reveal Solution Hide Solution   Discussion   7

Correct Answer: B 🗳️

Question #3 Topic 1

John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization.
Which of the following attack techniques is used by John?

  • A. Insider threat
  • B. Diversion theft
  • C. Spear-phishing sites
  • D. Advanced persistent threat
Reveal Solution Hide Solution   Discussion   4

Correct Answer: D 🗳️

Question #4 Topic 1

You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?

  • A. nmap -A - Pn
  • B. nmap -sP -p-65535 -T5
  • C. nmap -sT -O -T0
  • D. nmap -A --host-timeout 99 -T1
Reveal Solution Hide Solution   Discussion   8

Correct Answer: C 🗳️

Question #5 Topic 1

This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as GCMP-256, HMAC-SHA384, and ECDSA using a 384-bit elliptic curve.
Which is this wireless security protocol?

  • A. WPA3-Personal
  • B. WPA3-Enterprise
  • C. WPA2-Enterprise
  • D. WPA2-Personal
Reveal Solution Hide Solution   Discussion   7

Correct Answer: B 🗳️

Community vote distribution
A (35%)
C (25%)
B (20%)
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

Loading ...