Higher Test Marks with Free Online 312-50 Exam Practice

Assess the CertsIQ’s updated 312-50 exam questions for free online practice of your Certified Ethical Hacker V13 test. Our CEH v12 312 50 dumps questions will enhance your chances of passing the Certified Ethical Hacker certification exam with higher marks.

Exam Code: 312-50
Exam Questions: 885
Certified Ethical Hacker V13
Updated: 14 Apr, 2026
Question 1

A Security Engineer at a medium-sized accounting firm has been tasked with discovering how much
information can be obtained from the firm’s public facing web servers. The engineer decides to start by using
netcat to port 80.
The engineer receives this output:
HTTP/1.1 200 OK
Server: Microsoft-IIS/6
Expires: Tue, 17 Jan 2011 01:41:33 GMT
Date: Mon, 16 Jan 2011 01:41:33 GMT
Content-Type: text/html
Accept-Ranges: bytes
Last Modified: Wed, 28 Dec 2010 15:32:21 GMT
ETag:“b0aac0542e25c31:89d”
Content-Length: 7369
Which of the following is an example of what the engineer performed?

Options :
Answer: A

Question 2

An ethical hacker is hired to evaluate the defenses of an organization's database system which is known to employ a signature-based IDS. The hacker knows that some SQL Injection evasion techniques may allow him to bypass the system's signatures. During the operation, he successfully retrieved a list of usernames from the database without triggering an alarm by employing an advanced evasion technique. Which of the following could he have used?

Options :
Answer: D

Question 3

Rebecca, a security professional, wants to authenticate employees who use web services for safe and secure communication. In this process, she employs a component of the Web Service Architecture, which is an extension of SOAP, and it can maintain the integrity and confidentiality of SOAP messages. Which of the following components of the Web Service Architecture is used by Rebecca for securing the communication? 

Options :
Answer: D

Question 4

The security administrator of ABC needs to permit Internet traffic in the host 10.0.0.2 and UDP traffic in the
host
10.0.0.3. He also needs to permit all FTP traffic to the rest of the network and deny all other traffic. After he
applied his ACL configuration in the router, nobody can access the ftp, and the permitted hosts cannot access
the Internet. According to the next configuration, what is happening in the network?
access-list 102 deny tcp any any
access-list 104 permit udp host 10.0.0.3 any
access-list 110 permit tcp host 10.0.0.2 eq www any
access-list 108 permit tcp any eq ftp any

Options :
Answer: B

Question 5

A zone file consists of which of the following Resource Records (RRs)? 

Options :
Answer: D

Viewing Page : 1 - 89
Practicing : 1 - 5 of 885 Questions

© Copyrights CertsIQ 2026. All Rights Reserved

We use cookies to ensure that we give you the best experience on our website (CertsIQ). If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the CertsIQ.