312-50v12 Practice Test Questions

569 Questions


Topic 2: Exam Pool B

You receive an e-mail like the one shown below. When you click on the link contained in
the mail, you are redirected to a website seeking you to download free Anti-Virus software.
Dear valued customers,
We are pleased to announce the newest version of Antivirus 2010 for Windows which will
probe you with total security against the latest spyware, malware, viruses, Trojans and
other online threats. Simply visit the link below and enter your antivirus code:

or you may contact us at the following address:

Media Internet Consultants, Edif. Neptuno, Planta
Baja, Ave. Ricardo J. Alfaro, Tumba Muerto, n/a Panama
How will you determine if this is Real Anti-Virus or Fake Anti-Virus website?


A.

Look at the website design, if it looks professional then it is a Real Anti-Virus website


B.

Connect to the site using SSL, if you are successful then the website is genuine


C.

Search using the URL and Anti-Virus product name into Google and lookout for
suspicious warnings against this site


D.

Download and install Anti-Virus software from this suspicious looking site, your Windows
7 will prompt you and stop the installation if the downloaded file is a malware


E.

Download and install Anti-Virus software from this suspicious looking site, your Windows
7 will prompt you and stop the installation if the downloaded file is a malware





C.
  

Search using the URL and Anti-Virus product name into Google and lookout for
suspicious warnings against this site



What is the common name for a vulnerability disclosure program opened by companies In
platforms such as HackerOne?


A.

Vulnerability hunting program


B.

Bug bounty program


C.

White-hat hacking program


D.

Ethical hacking program





B.
  

Bug bounty program



Bug bounty programs allow independent security researchers to report bugs to an
companies and receive rewards or compensation. These bugs area unit sometimes
security exploits and vulnerabilities, although they will additionally embody method
problems, hardware flaws, and so on.
The reports area unit usually created through a program travel by associate degree
freelance third party (like Bugcrowd or HackerOne). The companies can got wind of (and
run) a program curated to the organization’s wants.
Programs is also non-public (invite-only) wherever reports area unit unbroken confidential
to the organization or public (where anyone will sign in and join). they will happen over a
collection timeframe or with without stopping date (though the second possibility is a lot of
common).
Who uses bug bounty programs?Many major organizations use bug bounties as an area of their security program, together with AOL, Android, Apple, Digital Ocean, and goldman
Sachs. you’ll read an inventory of all the programs offered by major bug bounty suppliers,
Bugcrowd and HackerOne, at these links.
Why do corporations use bug bounty programs?Bug bounty programs provide corporations
the flexibility to harness an outsized cluster of hackers so as to seek out bugs in their code.
This gives them access to a bigger variety of hackers or testers than they’d be able to
access on a one-on-one basis. It {can also|also will|can even|may also|may} increase the
probabilities that bugs area unit found and reported to them before malicious hackers can
exploit them.
It may also be an honest publicity alternative for a firm. As bug bounties became a lot of
common, having a bug bounty program will signal to the general public and even regulators
that a corporation incorporates a mature security program.
This trend is likely to continue, as some have began to see bug bounty programs as an
business normal that all companies ought to invest in.
Why do researchers and hackers participate in bug bounty programs?Finding and news
bugs via a bug bounty program may end up in each money bonuses and recognition. In
some cases, it will be a good thanks to show real-world expertise once you are looking for
employment, or will even facilitate introduce you to parents on the protection team within an
companies.
This can be full time income for a few of us, income to supplement employment, or the way
to point out off your skills and find a full time job.
It may also be fun! it is a nice (legal) probability to check out your skills against huge
companies and government agencies.
What area unit the disadvantages of a bug bounty program for independent researchers
and hackers?A lot of hackers participate in these varieties of programs, and it will be tough
to form a major quantity of cash on the platform.
In order to say the reward, the hacker has to be the primary person to submit the bug to the
program. meaning that in apply, you may pay weeks searching for a bug to use, solely to
be the person to report it and build no cash.
Roughly ninety seven of participants on major bug bounty platforms haven’t sold-out a bug.
In fact, a 2019 report from HackerOne confirmed that out of quite three hundred,000
registered users, solely around two.5% received a bounty in their time on the platform.
Essentially, most hackers are not creating a lot of cash on these platforms, and really few
square measure creating enough to switch a full time wage (plus they do not have
advantages like vacation days, insurance, and retirement planning).
What square measure the disadvantages of bug bounty programs for organizations?These
programs square measure solely helpful if the program ends up in the companies
realizeing issues that they weren’t able to find themselves (and if they’ll fix those problems)!
If the companies is not mature enough to be able to quickly rectify known problems, a bug
bounty program is not the right alternative for his or her companies.Also, any bug bounty program is probably going to draw in an outsized range of
submissions, several of which can not be high-quality submissions. a corporation must be
ready to cope with the exaggerated volume of alerts, and also the risk of a coffee signal to
noise magnitude relation (essentially that it’s probably that they’re going to receive quite
few unhelpful reports for each useful report).
Additionally, if the program does not attract enough participants (or participants with the
incorrect talent set, and so participants are not able to establish any bugs), the program is
not useful for the companies.
The overwhelming majority of bug bounty participants consider web site vulnerabilities
(72%, per HackerOn), whereas solely a number of (3.5%) value more highly to seek for
package vulnerabilities.
This is probably because of the actual fact that hacking in operation systems (like network
hardware and memory) needs a big quantity of extremely specialised experience. this
implies that firms may even see vital come on investment for bug bounties on websites,
and not for alternative applications, notably those that need specialised experience.
This conjointly implies that organizations which require to look at AN application or web site
among a selected time-frame may not need to rely on a bug bounty as there is no
guarantee of once or if they receive reports.
Finally, it are often probably risky to permit freelance researchers to try to penetrate your
network. this could end in public speech act of bugs, inflicting name harm within the
limelight (which could end in individuals not eager to purchase the organizations’ product or
service), or speech act of bugs to additional malicious third parties, United Nations agency
may use this data to focus on the organization.

How is the public key distributed in an orderly, controlled fashion so that the users can be
sure of the sender’s identity?


A.

Hash value


B.

Private key


C.

Digital signature


D.

Digital certificate





D.
  

Digital certificate



What is the algorithm used by LM for Windows2000 SAM?


A.

MD4


B.

DES


C.

SHA


D.

SSL





B.
  

DES



Daniel Is a professional hacker who Is attempting to perform an SQL injection attack on a
target website. www.movlescope.com. During this process, he encountered an IDS that
detects SQL Injection attempts based on predefined signatures. To evade any comparison
statement, he attempted placing characters such as ‘'or '1'='1" In any bask injection
statement such as "or 1=1." Identify the evasion technique used by Daniel in the above
scenario.


A.

Null byte


B.

IP fragmentation


C.

Char encoding


D.

Variation





D.
  

Variation



Explanation: One may append the comment “–” operator along with the String for the
username and whole avoid executing the password segment of the SQL query. Everything
when the — operator would be considered as comment and not dead.
To launch such an attack, the value passed for name could be ’OR ‘1’=‘1’ ; —Statement =
“SELECT * FROM ‘CustomerDB’ WHERE ‘name’ = ‘ ”+ userName + “ ‘ AND ‘password’ = ‘
” + passwd + “ ‘ ; ”
Statement = “SELECT * FROM ‘CustomerDB’ WHERE ‘name’ = ‘ ’ OR ‘1’=‘1‘;– + “ ‘ AND
‘password’ = ‘ ” + passwd + “ ‘ ; ”
All the records from the customer database would be listed.
Yet, another variation of the SQL Injection Attack can be conducted in dbms systems that
allow multiple SQL injection statements. Here, we will also create use of the vulnerability in sure dbms whereby a user provided field isn’t strongly used in or isn’t checked for sort
constraints.
This could take place once a numeric field is to be employed in a SQL statement; but, the
programmer makes no checks to validate that the user supplied input is numeric.
Variation is an evasion technique whereby the attacker can easily evade any comparison
statement. The attacker does this by placing characters such as “' or '1'='1'” in any basic
injection statement such as “or 1=1” or with other accepted SQL comments.
Evasion Technique: Variation Variation is an evasion technique whereby the attacker can
easily evade any comparison statement. The attacker does this by placing characters such
as “' or '1'='1'” in any basic injection statement such as “or 1=1” or with other accepted SQL
comments. The SQL interprets this as a comparison between two strings or characters
instead of two numeric values. As the evaluation of two strings yields a true statement,
similarly, the evaluation of two numeric values yields a true statement, thus rendering the
evaluation of the complete query unaffected. It is also possible to write many other
signatures; thus, there are infinite possibilities of variation as well. The main aim of the
attacker is to have a WHERE statement that is always evaluated as “true” so that any
mathematical or string comparison can be used, where the SQL can perform the same.

What kind of detection techniques is being used in antivirus softwares that identifies
malware by collecting data from multiple protected systems and instead of analyzing files
locally it's made on the premiers environment-


A.

VCloud based


B.

Honypot based


C.

Behaviour based


D.

Heuristics based





A.
  

VCloud based



Which of the following LM hashes represent a password of less than 8 characters?
(Choose two.)


A.

BA810DBA98995F1817306D272A9441BB


B.

44EFCE164AB921CQAAD3B435B51404EE


C.

0182BD0BD4444BF836077A718CCDF409


D.

CEC52EB9C8E3455DC2265B23734E0DAC


E.

B757BF5C0D87772FAAD3B435B51404EE


F.

E52CAC67419A9A224A3B108F3FA6CB6D





B.
  

44EFCE164AB921CQAAD3B435B51404EE



E.
  

B757BF5C0D87772FAAD3B435B51404EE



In the field of cryptanalysis, what is meant by a “rubber-hose" attack?


A.

Attempting to decrypt cipher text by making logical assumptions about the contents of
the original plain text.


B.

Extraction of cryptographic secrets through coercion or torture


C.

Forcing the targeted key stream through a hardware-accelerated device such as an
ASIC.


D.

A backdoor placed into a cryptographic algorithm by its creator.





B.
  

Extraction of cryptographic secrets through coercion or torture



A newly joined employee. Janet, has been allocated an existing system used by a previous
employee. Before issuing the system to Janet, it was assessed by Martin, the
administrator. Martin found that there were possibilities of compromise through user
directories, registries, and other system parameters. He also Identified vulnerabilities such
as native configuration tables, incorrect registry or file permissions, and software
configuration errors. What is the type of vulnerability assessment performed by Martin?


A.

Credentialed assessment


B.

Database assessment


C.

Host-based assessment


D.

Distributed assessment





C.
  

Host-based assessment



Explanation: The host-based vulnerability assessment (VA) resolution arose from the
auditors’ got to periodically review systems. Arising before the net becoming common,
these tools typically take an “administrator’s eye” read of the setting by evaluating all of the knowledge that an administrator has at his or her disposal.
UsesHost VA tools verify system configuration, user directories, file systems, registry
settings, and all forms of other info on a number to gain information about it. Then, it
evaluates the chance of compromise. it should also live compliance to a predefined
company policy so as to satisfy an annual audit. With administrator access, the scans area
unit less possible to disrupt traditional operations since the computer code has the access
it has to see into the complete configuration of the system.
What it Measures Host
VA tools will examine the native configuration tables and registries to spot not solely
apparent vulnerabilities, however additionally “dormant” vulnerabilities – those weak or
misconfigured systems and settings which will be exploited when an initial entry into the
setting. Host VA solutions will assess the safety settings of a user account table; the
access management lists related to sensitive files or data; and specific levels of trust
applied to other systems. The host VA resolution will a lot of accurately verify the extent of
the danger by determinant however way any specific exploit could also be ready to get.

Vlady works in a fishing company where the majority of the employees have very little
understanding of IT let alone IT Security. Several information security issues that Vlady
often found includes, employees sharing password, writing his/her password on a post it
note and stick it to his/her desk, leaving the computer unlocked, didn’t log out from emails
or other social media accounts, and etc.
After discussing with his boss, Vlady decided to make some changes to improve the
security environment in his company. The first thing that Vlady wanted to do is to make the
employees understand the importance of keeping confidential information, such as
password, a secret and they should not share it with other persons.
Which of the following steps should be the first thing that Vlady should do to make the
employees in his company understand to importance of keeping confidential information a
secret?


A.

Warning to those who write password on a post it note and put it on his/her desk


B.

Developing a strict information security policy


C.

Information security awareness training


D.

Conducting a one to one discussion with the other employees about the importance of information security





A.
  

Warning to those who write password on a post it note and put it on his/her desk



You are trying to break into a highly classified top-secret mainframe computer with highest
security system in place at Merclyn Barley Bank located in Los Angeles.
You know that conventional hacking doesn't work in this case, because organizations such
as banks are generally tight and secure when it comes to protecting their systems.
In other words, you are trying to penetrate an otherwise impenetrable system.
How would you proceed?


A.

Look for "zero-day" exploits at various underground hacker websites in Russia and
China and buy the necessary exploits from these hackers and target the bank's network


B.

Try to hang around the local pubs or restaurants near the bank, get talking to a poorlypaid
or disgruntled employee, and offer them money if they'll abuse their access privileges
by providing you with sensitive information


C.

Launch DDOS attacks against Merclyn Barley Bank's routers and firewall systems using
100, 000 or more "zombies" and "bots"Try to conduct Man-in-the-Middle (MiTM) attack and divert the network traffic going to
the Merclyn Barley Bank's Webserver to that of your machine using DNS Cache Poisoning
techniques


D.

Try to conduct Man-in-the-Middle (MiTM) attack and divert the network traffic going to
the Merclyn Barley Bank's Webserver to that of your machine using DNS Cache Poisoning
techniques





B.
  

Try to hang around the local pubs or restaurants near the bank, get talking to a poorlypaid
or disgruntled employee, and offer them money if they'll abuse their access privileges
by providing you with sensitive information



There are multiple cloud deployment options depending on how isolated a customer's
resources are from those of other customers. Shared environments share the costs and
allow each customer to enjoy lower operations expenses. One solution Is for a customer to
Join with a group of users or organizations to share a cloud environment. What is this cloud
deployment option called?


A.

Hybrid


B.

Community


C.

Public


D.

Private





B.
  

Community



The purpose of this idea is to permit multiple customers to figure on joint projects and
applications that belong to the community, where it’s necessary to possess a centralized
clouds infrastructure. In other words, Community Cloud may be a distributed infrastructure
that solves the precise problems with business sectors by integrating the services provided
by differing types of clouds solutions.
The communities involved in these projects, like tenders, business organizations, and
research companies, specialise in similar issues in their cloud interactions. Their shared
interests may include concepts and policies associated with security and compliance
considerations, and therefore the goals of the project also .
Community Cloud computing facilitates its users to spot and analyze their business
demands better. Community Clouds could also be hosted during a data center, owned by
one among the tenants, or by a third-party cloud services provider and may be either onsite
or off-site.
Community Cloud Examples and Use CasesCloud providers have developed Community
Cloud offerings, and a few organizations are already seeing the advantages . the
subsequent list shows a number of the most scenarios of the Community Cloud model
that’s beneficial to the participating organizations.
Multiple governmental departments that perform transactions with each other can
have their processing systems on shared infrastructure. This setup makes it costeffective
to the tenants, and may also reduce their data traffic.
Benefits of Community CloudsCommunity Cloud provides benefits to organizations within
the community, individually also as collectively. Organizations don’t need to worry about
the safety concerns linked with Public Cloud due to the closed user group.
This recent cloud computing model has great potential for businesses seeking costeffective
cloud services to collaborate on joint projects, because it comes with multiple
advantages.
Openness and ImpartialityCommunity Clouds are open systems, and that they remove the
dependency organizations wear cloud service providers. Organizations are able to do
many benefits while avoiding the disadvantages of both public and personal clouds.
Ensures compatibility among each of its users, allowing them to switch properties
consistent with their individual use cases. They also enable companies to interact
with their remote employees and support the utilization of various devices, be it a
smartphone or a tablet. This makes this sort of cloud solution more flexible to
users’ demands.
Consists of a community of users and, as such, is scalable in several aspects like
hardware resources, services, and manpower. It takes under consideration
demand growth, and you simply need to increase the user-base.
Flexibility and ScalabilityHigh Availability and ReliabilityYour cloud service must be ready to
make sure the availability of knowledge and applications in the least times. Community
Clouds secure your data within the same way as the other cloud service, by replicating
data and applications in multiple secure locations to guard them from unforeseen
circumstances.
Cloud possesses redundant infrastructure to form sure data is out there whenever and wherever you would like it. High availability and reliability are critical concerns for any sort
of cloud solution.
Security and ComplianceTwo significant concerns discussed when organizations believe
cloud computing are data security and compliance with relevant regulatory authorities.
Compromising each other’s data security isn’t profitable to anyone during a Community
Cloud.
the power to dam users from editing and downloading specific datasets.
Making sensitive data subject to strict regulations on who has access to Sharing
sensitive data unique to a specific organization would bring harm to all or any the
members involved.
What devices can store sensitive data.
Users can configure various levels of security for his or her data. Common use
cases:Convenience and ControlConflicts associated with convenience and control don’t
arise during a Community Cloud. Democracy may be a crucial factor the Community Cloud
offers as all tenants share and own the infrastructure and make decisions collaboratively.
This setup allows organizations to possess their data closer to them while avoiding the
complexities of a personal Cloud.
Less Work for the IT DepartmentHaving data, applications, and systems within the cloud
means you are doing not need to manage them entirely. This convenience eliminates the
necessity for tenants to use extra human resources to manage the system. Even during a
self-managed solution, the work is split among the participating organizations.
Environment SustainabilityIn the Community Cloud, organizations use one platform for all
their needs, which dissuades them from investing in separate cloud facilities. This shift
introduces a symbiotic relationship between broadening and shrinking the utilization of
cloud among clients. With the reduction of organizations using different clouds, resources
are used more efficiently, thus resulting in a smaller carbon footprint.


Page 17 out of 48 Pages
Previous