312-50v13 Practice Test Questions

551 Questions


Topic 1 : Exam Pool A

What does the –oX flag do in an Nmap scan?


A. Perform an eXpress scan


B. Output the results in truncated format to the screen


C. Output the results in XML format to a file


D. Perform an Xmas scan





C.
  Output the results in XML format to a file

Which method of password cracking takes the most time and effort?


A. Dictionary attack


B. Shoulder surfing


C. Rainbow tables


D. Brute force





D.
  Brute force

A new wireless client is configured to join a 802.11 network. This client uses the same hardware and software as many of the other clients on the network. The client can see the network, but cannot connect. A wireless packet sniffer shows that the Wireless Access Point (WAP) is not responding to the association requests being sent by the wireless client. What is a possible source of this problem?


A. The WAP does not recognize the client’s MAC address


B. The client cannot see the SSID of the wireless network


C. Client is configured for the wrong channel


D. The wireless client is not configured to use DHCP





A.
  The WAP does not recognize the client’s MAC address

Which regulation defines security and privacy controls for Federal information systems and organizations?


A. HIPAA


B. EU Safe Harbor


C. PCI-DSS


D. NIST-800-53





D.
  NIST-800-53

A network administrator discovers several unknown files in the root directory of his Linux FTP server. One of the files is a tarball, two are shell script files, and the third is a binary file is named "nc." The FTP server's access logs show that the anonymous user account logged in to the server, uploaded the files, and extracted the contents of the tarball and ran the script using a function provided by the FTP server's software. The “ps” command shows that the “nc” file is running as process, and the netstat command shows the “nc” process is listening on a network port.
What kind of vulnerability must be present to make this remote attack possible?


A. File system permissions


B. Privilege escalation


C. Directory traversal


D. Brute force login





A.
  File system permissions

DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?


A. Spanning tree


B. Dynamic ARP Inspection (DAI)


C. Port security


D. Layer 2 Attack Prevention Protocol (LAPP)





B.
  Dynamic ARP Inspection (DAI)

You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet. What is the recommended architecture in terms of server placement?


A. All three servers need to be placed internally


B. A web server facing the Internet, an application server on the internal network, a database server on the internal network


C. A web server and the database server facing the Internet, an application server on the internal network


D. All three servers need to face the Internet so that they can communicate between themselves





B.
  A web server facing the Internet, an application server on the internal network, a database server on the internal network

Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations.
Bob also concluded that DMZ makes sense just when a stateful firewall is available, which is not the case of TPNQM SA.
In this context, what can you say?


A. Bob can be right since DMZ does not make sense when combined with stateless firewalls


B. Bob is partially right. He does not need to separate networks if he can create rules by destination IPs, one by one


C. Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations


D. Bob is partially right. DMZ does not make sense when a stateless firewall is available





C.
  Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations

Which type of security feature stops vehicles from crashing through the doors of a building?


A. Bollards


B. Receptionist


C. Mantrap


D. Turnstile





A.
  Bollards

A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the Prometric Online Testing – Reports https://ibt1.prometric.com/users/custom/report_queue/rq_str... corporate network. What tool should the analyst use to perform a Blackjacking attack?


A. Paros Proxy


B. BBProxy


C. Blooover


D. BBCrack





B.
  BBProxy

A large mobile telephony and data network operator has a data center that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems.
What is the best security policy concerning this setup?


A. Network elements must be hardened with user ids and strong passwords. Regular security tests and audits should be performed.


B. As long as the physical access to the network elements is restricted, there is no need for additional measures.


C. There is no need for specific security measures on the network elements as long as firewalls and IPS systems exist.


D. The operator knows that attacks and down time are inevitable and should have a backup site.





A.
  Network elements must be hardened with user ids and strong passwords. Regular security tests and audits should be performed.

You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration? alert tcp any any -> 192.168.100.0/24 21 (msg: ““FTP on the network!””;)


A. A firewall IPTable


B. FTP Server rule


C. A Router IPTable


D. An Intrusion Detection System





D.
  An Intrusion Detection System


Page 10 out of 46 Pages
Previous