Ceh 312 50v12 Certified Ethical Hacker V12 Exam Practice Test - Set 1

Test your knowledge with this Ceh 312 50v12 Certified Ethical Hacker V12 Exam mock exam. Get real-world IT questions and prepare for certification success.

312-50v12: Certified Ethical Hacker v12 (CEH v12) - Exam Information

Exam Information

Exam Code

Ceh 312 50v12 Certified Ethical Hacker V12 Exam

Exam Title

312-50v12: Certified Ethical Hacker v12 (CEH v12)

Vendor

CEH

Difficulty

Advanced

Duration

4 Hours

Question Format

Multiple Choice

Last Updated

March 10, 2025

This version introduces enhanced security techniques and real-world cyberattack scenarios.

Practice Test

Shop Best 312-50v12: Certified Ethical Hacker v12 (CEH v12) Resources Worldwide Amazon

1. Which of these is an example of a reconnaissance attack?

Port scanning
SQL injection
DDoS attack
Phishing

2. What is the main purpose of a honeypot in cybersecurity?

Attract attackers to study their methods
Secure encrypted files
Prevent phishing emails
Monitor physical security breaches

3. Which tool is commonly used for packet sniffing?

Wireshark
Nmap
Metasploit
John the Ripper

4. Which attack aims to flood a system with traffic?

DDoS attack
Man-in-the-middle
SQL Injection
Phishing

5. What is the purpose of privilege escalation?

Gain unauthorized higher-level access
Monitor traffic
Decrypt files
Create backups

6. What does a vulnerability scanner do?

Identifies security weaknesses
Encrypts network traffic
Repairs infected systems
Erases logs

7. Which type of malware locks users out of their systems?

Ransomware
Trojan
Rootkit
Spyware

8. Which tool is used to exploit vulnerabilities?

Metasploit
Wireshark
Nmap
Aircrack-ng

9. Which port is commonly used by HTTP?

80
22
443
25

10. Which term describes tricking people into revealing sensitive information?

Social engineering
Phishing
Brute force
DDoS

11. What is the main function of an Intrusion Detection System (IDS)?

Monitor and alert on suspicious activities
Encrypt communications
Patch vulnerabilities
Block unauthorized access

12. Which technique involves injecting malicious SQL code?

SQL Injection
Phishing
Cross-site scripting
ARP Spoofing

13. Which phase of ethical hacking involves gaining unauthorized access?

Exploitation
Reconnaissance
Maintaining access
Covering tracks

14. What is a key step in covering tracks?

Clearing logs
Encrypting data
Scanning ports
Gaining root access

15. Which tool is used for wireless network auditing?

Aircrack-ng
Burp Suite
Snort
Wireshark

16. Which technique is used to obscure malicious code?

Steganography
Hashing
Phishing
Privilege escalation

17. What does a firewall primarily do?

Filter incoming and outgoing traffic
Scan for malware
Manage user credentials
Encrypt emails

18. Which type of attack uses fake websites to collect data?

Phishing
DDoS
Brute force
Session hijacking

19. Which tool helps identify weak passwords?

John the Ripper
Nmap
Metasploit
Wireshark

20. What is the primary objective of ethical hacking?

Identify and fix vulnerabilities
Create new viruses
Disrupt corporate networks
Access confidential data

21. What is the primary purpose of ARP spoofing?

To redirect traffic through an attacker’s machine
To encrypt network traffic
To scan for open ports
To crack passwords

22. Which protocol is vulnerable to sniffing attacks?

HTTP
HTTPS
SSH
SFTP

23. What does a zero-day exploit target?

A vulnerability unknown to the vendor
Outdated software
Weak passwords
Misconfigured firewalls

24. Which tool is used for brute-forcing directories on a web server?

DirBuster
Nmap
Burp Suite
Metasploit

25. What is the purpose of a rainbow table?

To reverse cryptographic hashes
To encrypt data
To scan networks
To spoof MAC addresses

26. Which attack exploits session tokens?

Session hijacking
Phishing
DDoS
SQL Injection

27. What is the main risk of using WEP encryption?

It can be cracked easily
It slows down the network
It requires expensive hardware
It is incompatible with modern devices

28. Which tool is used for intercepting HTTP traffic?

Burp Suite
Aircrack-ng
John the Ripper
Nessus

29. What is the purpose of a CAN bus attack?

To compromise vehicle systems
To exploit industrial control systems
To attack IoT devices
To bypass firewalls

30. Which technique hides data within an image file?

Steganography
Encryption
Hashing
Obfuscation

31. What is the primary function of Snort?

Network intrusion detection
Password cracking
Vulnerability scanning
Traffic encryption

32. Which attack targets DNS servers?

DNS cache poisoning
ARP spoofing
SQL Injection
Cross-site scripting

33. What is the purpose of a sandbox in malware analysis?

To safely execute and observe malware
To encrypt malicious files
To block network attacks
To crack ransomware

34. Which tool is used for wireless packet injection?

Aircrack-ng
Wireshark
Nmap
Metasploit

35. What does MAC flooding target?

Network switches
Web servers
Databases
Firewalls

36. Which vulnerability allows code execution via buffer overflow?

Stack-based overflow
CSRF
XSS
Directory traversal

37. What is the purpose of theHarvester?

Gather OSINT (Open-Source Intelligence)
Exploit SQL vulnerabilities
Crack passwords
Scan for open ports

38. Which attack exploits trust relationships between systems?

Pass-the-hash
Phishing
DDoS
MITM

39. What is the primary risk of misconfigured cloud storage?

Unauthorized data access
Slow performance
Hardware failure
High costs

40. Which tool is used for automating web application attacks?

OWASP ZAP
Nessus
Tcpdump
Hydra

41. What is the primary purpose of a reverse shell?

To establish a connection back to the attacker
To encrypt victim data
To scan for vulnerabilities
To spoof DNS records

42. Which attack involves modifying data packets in transit?

Packet injection
Phishing
DDoS
SQLi

43. What does DLL hijacking exploit?

Windows library loading mechanisms
Linux kernel vulnerabilities
macOS sandbox escapes
iOS app permissions

44. Which tool is used for password spraying attacks?

Hydra
Nmap
Wireshark
Metasploit

45. What is the main risk of SSH version 1?

Weak encryption algorithms
No authentication support
Incompatibility with modern systems
Slow performance

46. Which technique is used to bypass biometric authentication?

Silicone fingerprint replication
Password cracking
RFID cloning
Shoulder surfing

47. What does "pivoting" refer to in penetration testing?

Moving through a network using compromised systems
Rotating encryption keys
Changing MAC addresses
Bypassing firewalls

48. Which vulnerability affects poorly sanitized user input in web apps?

Cross-site scripting (XSS)
ARP spoofing
MAC flooding
BlueSmacking

49. What is the purpose of the Responder tool?

Intercepting LLMNR/NBT-NS traffic
Cracking WPA2
Exploiting buffer overflows
Bypassing 2FA

50. Which attack exploits race conditions?

TOCTOU (Time of Check to Time of Use)
Phishing
DNS spoofing
SQL injection

51. What is the primary risk of using Telnet?

Unencrypted communication
Slow transfer speeds
No authentication
Incompatibility with IPv6

52. Which tool is used for analyzing malware memory dumps?

Volatility
Burp Suite
Nessus
Aircrack-ng

53. What does "living off the land" (LOTL) refer to?

Using legitimate system tools for malicious purposes
Exploiting zero-day vulnerabilities
Physical security breaches
Social engineering attacks

54. Which attack involves forcing a system to revert to weaker protocols?

Downgrade attack
DNS spoofing
ARP poisoning
SQL injection

55. What is the purpose of the Shodan search engine?

Finding exposed IoT devices
Cracking passwords
Analyzing malware
Intercepting wireless traffic

56. Which vulnerability results from improper error handling?

Information disclosure
Buffer overflow
Race condition
Integer overflow

57. What does Kerberoasting target?

Active Directory service accounts
Linux root privileges
Wi-Fi networks
Web application sessions

58. Which tool is used for fuzzing applications?

American Fuzzy Lop (AFL)
John the Ripper
Tcpdump
Nikto

59. What is the primary risk of USB drop attacks?

Malware execution via autorun
Data theft through RFID
Network sniffing
BIOS-level compromises

60. Which technique bypasses signature-based antivirus?

Polymorphic code
MAC spoofing
IP fragmentation
SSL stripping

61. What does "credential stuffing" exploit?

Password reuse across services
Weak encryption
Session fixation
CSRF tokens

62. Which attack manipulates time stamps in logs?

Timestamp forgery
DNS tunneling
ARP flooding
Bluejacking

63. What is the purpose of the Empire post-exploitation framework?

Maintaining persistent access
Cracking WPA2
Scanning for SQLi
Analyzing PCAP files

64. Which vulnerability affects IoT devices with default credentials?

Hardcoded passwords
Buffer overflows
XSS
CSRF

65. What does "typosquatting" target?

Users mistyping URLs
Weak SSL certificates
Misconfigured DNS
Outdated plugins

66. Which tool is used for analyzing network flows?

nfdump
hashcat
Ghidra
SET

67. What is the primary risk of RFID skimming?

Wireless credential theft
Network eavesdropping
Database corruption
Privilege escalation

68. Which attack exploits JSON Web Tokens (JWT)?

Algorithm confusion
DNS rebinding
SMTP relay
NTP amplification

69. What is the purpose of the Covenant C2 framework?

Command and control operations
Password cracking
Vulnerability scanning
Traffic analysis

70. Which technique hides network traffic in DNS queries?

DNS tunneling
ICMP covert channel
HTTP smuggling
ARP spoofing

71. What does "Bluejacking" involve?

Sending unsolicited Bluetooth messages
Exploiting Bluetooth stack flaws
Cracking Bluetooth PINs
Spoofing BLE devices

72. Which tool is used for analyzing Android malware?

MobSF
OllyDbg
IDA Pro
Radare2

73. What is the primary risk of SS7 vulnerabilities?

Cellular network interception
Wi-Fi cracking
Email spoofing
Database injection

74. Which attack exploits CPU speculative execution?

Spectre
Heartbleed
Shellshock
DROWN

75. What is the purpose of the Frida dynamic instrumentation toolkit?

Runtime application analysis
Network mapping
Password recovery
Log analysis

76. Which technique bypasses ASLR?

Return-oriented programming (ROP)
NOP sleds
Heap spraying
Format string attacks

77. What does "formjacking" target?

Web form data theft
Database corruption
Email headers
API endpoints

78. Which tool is used for analyzing iOS applications?

Objection
Wireshark
Metasploit
Sqlmap

79. What is the primary risk of VBA macro-enabled documents?

Delivering malware
Corrupting files
Stealing printer data
Bypassing firewalls

80. Which attack exploits insecure deserialization?

Object injection
XML bombing
HTTP request smuggling
SMTP injection

81. What is the purpose of the BloodHound tool?

Mapping Active Directory attack paths
Cracking NTLM hashes
Intercepting GSM traffic
Analyzing JavaScript

82. Which technique evades heuristic analysis?

Code obfuscation
MAC spoofing
Port knocking
SSL stripping

83. What does "SIM swapping" exploit?

Mobile carrier verification flaws
Bluetooth vulnerabilities
NFC weaknesses
Baseband processor bugs

84. Which tool is used for binary diffing?

BinDiff
Burp Suite
Nmap
Aircrack-ng

85. What is the primary risk of exposed Docker APIs?

Container escape
Data corruption
Network slowdowns
DNS leaks

86. Which attack exploits HTTP request smuggling?

CL.TE vulnerabilities
XML injection
JSON hijacking
SOAP poisoning

87. What is the purpose of the Ghidra tool?

Reverse engineering binaries
Password spraying
Traffic analysis
Vulnerability scanning

88. Which technique bypasses WAFs?

Obfuscated SQLi
MAC flooding
ARP spoofing
ICMP tunneling

89. What does "vishing" refer to?

Voice phishing
Video call hijacking
Virtual machine escapes
VPN credential theft

90. Which tool is used for analyzing ransomware?

Cuckoo Sandbox
Nikto
TShark
Snort

91. What is the primary risk of exposed Kubernetes dashboards?

Cluster compromise
Data encryption
Network partitioning
API throttling

92. Which attack exploits server-side template injection?

SSTI
XXE
CSRF
SSRF

93. What is the purpose of the PE-sieve tool?

Detecting code injections
Cracking ZIP files
Mapping networks
Analyzing logs

94. Which technique bypasses biometric authentication?

3D-printed facial recognition spoofing
RFID cloning
Shoulder surfing
Thermal residue analysis

95. What does "quishing" target?

QR code phishing
Quantum cryptography
Quick Response systems
Query parameter tampering

96. Which tool is used for analyzing IoT firmware?

Firmwalker
John the Ripper
Aircrack-ng
Sqlmap

97. What is the primary risk of exposed GraphQL interfaces?

Data over-fetching
DDoS amplification
Email spoofing
BIOS corruption

98. Which attack exploits WebSocket protocols?

WS-hijacking
HTML smuggling
DNS rebinding
JPEG steganography

99. What is the purpose of the Dufflebag tool?

Analyzing exposed EBS snapshots
Cracking WPS
Intercepting BLE
Fuzzing APIs

100. Which technique evades EDR solutions?

Direct system calls
MAC randomization
IP fragmentation
TCP window scaling

101. What does "scareware" typically do?

Fake antivirus alerts
Encrypt files silently
Steal cookies
Modify BIOS

102. Which tool is used for analyzing PowerShell attacks?

PSDecode
Volatility
Radare2
Ghidra

103. What is the primary risk of exposed S3 buckets?

Data leakage
Compute resource theft
DNS hijacking
Email spoofing

104. Which attack exploits insecure JWT implementations?

None algorithm attack
XML bombing
HTTP request smuggling
SMTP injection

105. What is the purpose of the KioskBreak tool?

Escaping restricted kiosk modes
Cracking BitLocker
Bypassing 2FA
Intercepting NFC

106. Which technique bypasses MFA?

Session cookie theft
Credential stuffing
ARP spoofing
DNS tunneling

107. What does "browser pivoting" enable?

Using victim browser sessions
Exploiting Chrome zero-days
Bypassing CSP
Hijacking WebRTC

108. Which tool is used for analyzing .NET malware?

dnSpy
IDA Pro
Wireshark
Metasploit

109. What is the primary risk of exposed Redis instances?

Unauthorized command execution
Data corruption
Network flooding
DNS leaks

110. Which attack exploits WebCache poisoning?

Abusing CDN caching behaviors
SQL injection
XSS
CSRF

111. What is the purpose of the Sliver C2 framework?

Post-exploitation operations
Password cracking
Network scanning
Log analysis

112. Which technique bypasses ASMI protections?

Return-oriented programming (ROP)
Heap spraying
Format string attacks
NOP sleds

113. What does "ISO dropping" deliver?

Malicious disk images
Firmware updates
BIOS exploits
GPU rootkits

114. Which tool is used for analyzing EV certificates?

CertCheck
OpenSSL
Wireshark
Nmap

115. What is the primary risk of exposed Jenkins instances?

Pipeline compromise
Data corruption
Network sniffing
DNS rebinding

116. Which attack exploits DNS rebinding?

Bypassing same-origin policy
Cache poisoning
NXDOMAIN flooding
TXT record injection

117. What is the purpose of the Karonte tool?

Analyzing firmware inter-component communication
Cracking WPA3
Bypassing DEP
Intercepting BLE

118. Which technique bypasses hardware security modules?

Side-channel attacks
Buffer overflows
SQL injection
XSS

119. What does "living off trusted sites" (LOTS) involve?

Abusing legitimate cloud services for C2
Exploiting zero-days in browsers
Hijacking CDN resources
Spoofing TLS certificates

120. Which tool is used for analyzing APK files?

JADX
Radare2
Ghidra
IDA Pro

The Ceh 312 50v12 Certified Ethical Hacker V12 Exam certification is a globally recognized credential for IT professionals. This practice test helps you prepare by covering key topics like hardware, networking, troubleshooting, and security.

Want more practice? Check out our other mock exams:

© 2025 ITCertRocket.com - Hands-On IT Lab Exercises & Certification Prep. All rights reserved.