312-50v13 Practice Test Questions

551 Questions


Topic 1 : Exam Pool A

Todd has been asked by the security officer to purchase a counter-based authentication system. Which of the following best describes this type of system?


A. A biometric system that bases authentication decisions on behavioral attributes.


B. A biometric system that bases authentication decisions on physical attributes.


C. An authentication system that creates one-time passwords that are encrypted with secret keys.


D. An authentication system that uses passphrases that are converted into virtual passwords.





C.
  An authentication system that creates one-time passwords that are encrypted with secret keys.

What tool can crack Windows SMB passwords simply by listening to network traffic?


A. This is not possible


B. Netbus


C. NTFSDOS


D. L0phtcrack





D.
  L0phtcrack

This form of encryption algorithm is asymmetric key block cipher that is characterized by a 128-bit block size, and its key size can be up to 256 bits. Which among the following is this encryption algorithm?


A. Twofish encryption algorithm


B. HMAC encryption algorithm


C. IDEA


D. Blowfish encryption algorithm





A.
  Twofish encryption algorithm

OpenSSL on Linux servers includes a command line tool for testing TLS. What is the name of the tool and the correct syntax to connect to a web server?


A. openssl s_client -site www.website.com:443


B. openssl_client -site www.website.com:443


C. openssl s_client -connect www.website.com:443


D. openssl_client -connect www.website.com:443





C.
  openssl s_client -connect www.website.com:443

Taylor, a security professional, uses a tool to monitor her company's website, analyze the website's traffic, and track the geographical location of the users visiting the company's website. Which of the following tools did Taylor employ in the above scenario?


A. WebSite Watcher


B. web-Stat


C. Webroot


D. WAFW00F





B.
  web-Stat

Windows LAN Manager (LM) hashes are known to be weak.
Which of the following are known weaknesses of LM? (Choose three.)


A. Converts passwords to uppercase.


B. Hashes are sent in clear text over the network.


C. Makes use of only 32-bit encryption.


D. Effective length is 7 characters.





A.
  Converts passwords to uppercase.

B.
  Hashes are sent in clear text over the network.

D.
  Effective length is 7 characters.

Bob, an attacker, has managed to access a target loT device. He employed an online tool to gather information related to the model of the loT device and the certifications granted to it. Which of the following tools did Bob employ to gather the above Information?


A. search.com


B. EarthExplorer


C. Google image search


D. FCC ID search





D.
  FCC ID search

Which of the following is the primary objective of a rootkit?


A. It opens a port to provide an unauthorized service


B. It creates a buffer overflow


C. It replaces legitimate programs


D. It provides an undocumented opening in a program





C.
  It replaces legitimate programs

What is the common name for a vulnerability disclosure program opened by companies In platforms such as HackerOne?


A. Vulnerability hunting program


B. Bug bounty program


C. White-hat hacking program


D. Ethical hacking program





B.
  Bug bounty program

Tremp is an IT Security Manager, and he is planning to deploy an IDS in his small company. He is looking for an IDS with the following characteristics: - Verifies success or failure of an attack - Monitors system activities Detects attacks that a network-based IDS fails to detect - Near real-time detection and response - Does not require additional hardware - Lower entry cost Which type of IDS is best suited for Tremp's requirements?


A. Gateway-based IDS


B. Network-based IDS


C. Host-based IDS


D. Open source-based





C.
  Host-based IDS

You are analysing traffic on the network with Wireshark. You want to routinely run a cron job which will run the capture against a specific set of IPs - 192.168.8.0/24. What command you would use?


A. wireshark --fetch ''192.168.8*''


B. wireshark --capture --local masked 192.168.8.0 ---range 24


C. tshark -net 192.255.255.255 mask 192.168.8.0


D. sudo tshark -f''net 192 .68.8.0/24''





D.
  sudo tshark -f''net 192 .68.8.0/24''

While browsing his Facebook teed, Matt sees a picture one of his friends posted with the caption. "Learn more about your friends!", as well as a number of personal questions. Matt is suspicious and texts his friend, who confirms that he did indeed post it. With assurance that the post is legitimate. Matt responds to the questions on the post, a few days later. Mates bank account has been accessed, and the password has been changed. What most likely happened?


A. Matt inadvertently provided the answers to his security questions when responding to the post.


B. Matt's bank-account login information was brute forced.


C. Matt Inadvertently provided his password when responding to the post.


D. Matt's computer was infected with a keylogger.





A.
  Matt inadvertently provided the answers to his security questions when responding to the post.


Page 12 out of 46 Pages
Previous