312-50v13 Practice Test Questions

551 Questions


Topic 1 : Exam Pool A

Which of the following tools is used to analyze the files produced by several packet-capture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?


A. tcptrace


B. Nessus


C. OpenVAS


D. tcptraceroute





A.
  tcptrace

Which of the following describes the characteristics of a Boot Sector Virus?


A. Modifies directory table entries so that directory entries point to the virus code instead of the actual program.


B. Moves the MBR to another location on the RAM and copies itself to the original location of the MBR.


C. Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR.


D. Overwrites the original MBR and only executes the new virus code.





C.
  Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR.

What is the proper response for a NULL scan if the port is closed?


A. SYN


B. ACK


C. FIN


D. PSH


E. RST


F. No response





E.
  RST

is a set of extensions to DNS that provide the origin authentication of DNS data to DNS clients (resolvers) so as to reduce the threat of DNS poisoning, spoofing, and similar types of attacks.


A. DNSSEC


B. Resource records


C. Resource transfer


D. Zone transfer





A.
  DNSSEC

Which of the following program infects the system boot sector and the executable files at the same time?


A. Polymorphic virus


B. Stealth virus


C. Multipartite Virus


D. Macro virus





C.
  Multipartite Virus

A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0 /24. Which of the following has occurred?


A. The computer is not using a private IP address.


B. The gateway is not routing to a public IP address.


C. The gateway and the computer are not on the same network.


D. The computer is using an invalid IP address.





B.
  The gateway is not routing to a public IP address.

You have gained physical access to a Windows 2008 R2 server which has an accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your toolkit, you have an Ubuntu 9.10 Linux LiveCD. Which Linux-based tool can change any user’s password or activate disabled Windows accounts?


A. John the Ripper


B. SET


C. CHNTPW


D. Cain & Abel





C.
  CHNTPW

Null sessions are un-authenticated connections (not using a username or password.) to an NT or 2000 system. Which TCP and UDP ports must you filter to check null sessions on your network?


A. 137 and 139


B. 137 and 443


C. 139 and 443


D. 139 and 445





D.
  139 and 445

Your company performs penetration tests and security assessments for small and medium-sized business in the local area. During a routine security assessment, you discover information that suggests your client is involved with human trafficking.
What should you do?


A. Confront the client in a respectful manner and ask her about the data.


B. Copy the data to removable media and keep it in case you need it.


C. Ignore the data and continue the assessment until completed as agreed.


D. Immediately stop work and contact the proper legal authorities.





D.
  Immediately stop work and contact the proper legal authorities.

Which of the following Linux commands will resolve a domain name into IP address?


A. >host-t a hackeddomain.com


B. >host-t ns hackeddomain.com


C. >host -t soa hackeddomain.com


D. >host -t AXFR hackeddomain.com





A.
  >host-t a hackeddomain.com

To determine if a software program properly handles a wide range of invalid input, a form of automated testing can be used to randomly generate invalid input in an attempt to crash the program. What term is commonly used when referring to this type of testing?


A. Randomizing


B. Bounding


C. Mutating


D. Fuzzing





D.
  Fuzzing

Which of the following is assured by the use of a hash?


A. Authentication


B. Confidentiality


C. Availability


D. Integrity





D.
  Integrity


Page 1 out of 46 Pages