312-50v13 Practice Test Questions

551 Questions


Topic 1 : Exam Pool A

MX record priority increases as the number increases. (True/False.)


A. True


B. False





B.
  False

Which Intrusion Detection System is the best applicable for large environments where critical assets on the network need extra scrutiny and is ideal for observing sensitive network segments?


A. Honeypots


B. Firewalls


C. Network-based intrusion detection system (NIDS)


D. Host-based intrusion detection system (HIDS)





C.
  Network-based intrusion detection system (NIDS)

Which of the following represents the initial two commands that an IRC client sends to join an IRC network?


A. USER, NICK


B. LOGIN, NICK


C. USER, PASS


D. LOGIN, USER





A.
  USER, NICK

One of your team members has asked you to analyze the following SOA record. What is the version?
Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.) (Choose four.)


A. 200303028


B. 3600


C. 604800


D. 2400


E. 60


F. 4800





A.
  200303028

What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?


A. Residual risk


B. Impact risk


C. Deferred risk


D. Inherent risk





A.
  Residual risk

What is a “Collision attack” in cryptography?


A. Collision attacks try to get the public key


B. Collision attacks try to break the hash into three parts to get the plaintext value


C. Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key


D. Collision attacks try to find two inputs producing the same hash





D.
  Collision attacks try to find two inputs producing the same hash

A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer’s software and hardware without the owner’s permission. Their intention can either be to simply gain knowledge or to illegally make changes.
Which of the following class of hacker refers to an individual who works both offensively and defensively at various times?


A. White Hat


B. Suicide Hacker


C. Gray Hat


D. Black Hat





C.
  Gray Hat

PGP, SSL, and IKE are all examples of which type of cryptography?


A. Digest


B. Secret Key


C. Public Key


D. Hash Algorithm





C.
  Public Key

Which of the following is a command line packet analyzer similar to GUI-based Wireshark?


A. nessus


B. tcpdump


C. ethereal


D. jack the ripper





B.
  tcpdump

Which results will be returned with the following Google search query? site:target.com – site:Marketing. target.com accounting


A. Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting.


B. Results matching all words in the query.


C. Results for matches on target.com and Marketing.target.com that include the word “accounting”


D. Results matching “accounting” in domain target.com but not on the site Marketing.target.com





D.
  Results matching “accounting” in domain target.com but not on the site Marketing.target.com

What is the purpose of a demilitarized zone on a network?


A. To scan all traffic coming through the DMZ to the internal network


B. To only provide direct access to the nodes within the DMZ and protect the network behind it


C. To provide a place to put the honeypot


D. To contain the network devices you wish to protect





B.
  To only provide direct access to the nodes within the DMZ and protect the network behind it

What is the following command used for?
net use \targetipc$ "" /u:""


A. Grabbing the etc/passwd file


B. Grabbing the SAM


C. Connecting to a Linux computer through Samba.


D. This command is used to connect as a null session


E. Enumeration of Cisco routers





D.
  This command is used to connect as a null session


Page 11 out of 46 Pages
Previous