Logo
  • Home
  • All Courses
    • Amazon - AWS
    • Cisco
    • CompTIA
    • EC Council
    • Microsoft
    • Oracle
    • Salesforce
    • Snowflake
  • Testimonials
  • Blogs
  • Login
  • Register
  • Cart

Certified Ethical Hacker Exam (CEH v12) Free Questions - Part 30

Question No : 436) When purchasing a biometric system, one of the considerations that should be reviewed is the processing speed. Which of the following best describes what it is meant by processing?
A. The amount of time and resources that are necessary to maintain a biometric system 

B. How long it takes to setup individual user accounts

C. The amount of time it takes to be either accepted or rejected from when an individual provides identification and authentication information

D. The amount of time it takes to convert biometric data into a template on a smart card

Question No : 437) Which of the following is not a Bluetooth attack?
A. Bluedriving

B. Bluesmacking 

C. Bluejacking 

D. Bluesnarfing

Question No : 438) An attacker attaches a rogue router in a network. He wants to redirect traffic to a LAN attached to his router as part of a man-in-the-middle attack. What measure on behalf of the legitimate admin can mitigate this attack?
A. Make sure that legitimate network routers are configured to run routing protocols with authentication.

B. Disable all routing protocols and only use static routes

C. Only using OSPFv3 will mitigate this risk.

D. Redirection of the traffic cannot happen unless the admin allows it explicitly.

Question No : 439) You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?
A. hping2 host.domain.com

B. hping2 --set-ICMP host.domain.com 

C. hping2 -i host.domain.com

D. hping2 -1 host.domain.com

Question No : 440) Which of the following is a component of a risk assessment?
A. Administrative safeguards 

B. Physical security

C. DMZ

D. Logical interface

Question No : 441) Ron, a security professional, was pen testing web applications and SaaS platforms used by his company. While testing, he found a vulnerability that allows hackers to gain unauthorized access to API objects and perform actions such as view, update, and delete sensitive data of the company. What is the API vulnerability revealed in the above scenario?

A. Code injections

B. Improper use of CORS 

C. No ABAC validation

D. Business logic flaws

Question No : 442) Which is the first step followed by Vulnerability Scanners for scanning a network?
A. OS Detection
B. Firewall detection
C. TCP/UDP Port scanning
D. Checking if the remote host is alive

Question No : 443) Fingerprinting an Operating System helps a cracker because:
A. It defines exactly what software you have installed

B. It opens a security-delayed window based on the port being scanned

C. It doesn't depend on the patches that have been applied to fix existing security holes 

D. It informs the cracker of which vulnerabilities he may be able to exploit on your system

Question No : 444) You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly. What is the best Nmap command you will use? 

A. nmap -T4 -q 10.10.0.0/24

B. nmap -T4 -F 10.10.0.0/24 

C. nmap -T4 -r 10.10.1.0/24 

D. nmap -T4 -O 10.10.0.0/24

Question No : 445) Sam is working as a system administrator In an organization. He captured the principal characteristics of a vulnerability and produced a numerical score to reflect Its severity using CVSS v3.0 to property assess and prioritize the organization's vulnerability management processes. The base score that Sam obtained after performing cvss rating was 4.0. What is the CVSS severity level of the vulnerability discovered by Sam in the above scenario?
A. Medium 

B. Low

C. Critical 

D. High

Question No : 446) You want to analyze packets on your wireless network. Which program would you use?
A. Wireshark with Airpcap 

B. Airsnort with Airpcap

C. Wireshark with Winpcap 

D. Ethereal with Winpcap

Question No : 447) As a securing consultant, what are some of the things you would recommend to a company to ensure DNS security?
A. Use the same machines for DNS and other applications 

B. Harden DNS servers

C. Use split-horizon operation for DNS servers

D. Restrict Zone transfers

E. Have subnet diversity between DNS servers

Question No : 448) When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator’s Computer to update the router configuration. What type of an alert is this?
A. False negative 

B. True negative 

C. True positive 

D. False positive

Question No : 449) MX record priority increases as the number increases. (True/False.)
A. True 

B. False

Question No : 450) Which of the following statements is FALSE with respect to Intrusion Detection Systems?
A. Intrusion Detection Systems can be configured to distinguish specific content in network packets
B. Intrusion Detection Systems can easily distinguish a malicious payload in an encrypted traffic
C. Intrusion Detection Systems require constant update of the signature library
D. Intrusion Detection Systems can examine the contents of the data n context of the network protocol

 

312-50v12 Answers

 

 

Part 1

Part 2

Part 3

Part 4

Part 5

Part 6

Part 7

Part 8

Part 9

Part 10

Part 11

Part 12

Part 13

Part 14

Part 15

Part 16

Part 17

Part 18

Part 19

Part 20

Part 21

Part 22

Part 23

Part 24

Part 25

Part 26

Part 27

Part 28

Part 29

Part 30

Part 31

Part 32

Part 33

Part 34

Part 35

Logo

Our goal is to help students clear their exam by providing them genuine questions which helps students to achieve their goal. Many students have cleared their exam by going through our courses. Are you ready to clear yours?


Site Secured

mcaafe-secure

Last Scanned: 08-05-2025

Links

  • FAQ
  • Money Back Guarantee
  • About Us
  • Privacy Policy
  • Terms & Conditions
  • Contact Us
  • Testimonials

Disclaimer

  • SAP, Microsoft, Google, Amazon, Qualtrics, and all other brands are Registered Trademarks of their respective companies.
  • Theexamquestions.com is no way affiliated With any brand hosted on this website.
  • Theexamquestions.com offers only probable exam questions and answers.
  • Theexamquestions.com offer learning materials and practice tests created by subject matter technology experts to assist and help learners prepare for those exams. Theexamquestions.com do not offer dumps or questions from the actual exam.
  • Theexamquestions.com does not own or claim any ownership on any of the brands.
  • All Certification Brands used on the website are owned by the respective brand owners.

All course contents, trademarks, service marks, trade names, product names and logos appearing on the site are the property of their respective owners. The website Theexamquestions.com is in no way affiliated with any of the certification providers. Copyright © 2025 www.theexamquestions.com. All rights reserved.