312-50v13 Practice Test Questions

551 Questions


Topic 2 : Exam Pool B

These hackers have limited or no training and know how to use only basic techniques or tools. What kind of hackers are we talking about?


A. Black-Hat Hackers A


B. Script Kiddies


C. White-Hat Hackers


D. Gray-Hat Hacker





B.
  Script Kiddies

Bobby, an attacker, targeted a user and decided to hijack and intercept all their wireless communications. He installed a fake communication tower between two authentic endpoints to mislead the victim. Bobby used this virtual tower to interrupt the data transmission between the user and real tower, attempting to hijack an active session, upon receiving the users request. Bobby manipulated the traffic with the virtual tower and redirected the victim to a malicious website. What is the attack performed by Bobby in the above scenario?


A. Wardriving


B. KRACK attack


C. jamming signal attack


D. aLTEr attack





D.
  aLTEr attack

Which of the following commands checks for valid users on an SMTP server?


A. RCPT


B. CHK


C. VRFY


D. EXPN





C.
  VRFY

While examining audit logs, you discover that people are able to telnet into the SMTP server on port 25. You would like to block this, though you do not see any evidence of an attack or other wrong doing. However, you are concerned about affecting the normal functionality of the email server. From the following options choose how best you can achieve this objective?


A. Block port 25 at the firewall.


B. Shut off the SMTP service on the server.


C. Force all connections to use a username and password.


D. Switch from Windows Exchange to UNIX Sendmail.


E. None of the above.





E.
  None of the above.

Steven connected his iPhone to a public computer that had been infected by Clark, an attacker. After establishing the connection with the public computer, Steven enabled iTunes WI-FI sync on the computer so that the device could continue communication with that computer even after being physically disconnected. Now, Clark gains access to Steven’s iPhone through the infected computer and is able to monitor and read all of Steven’s activity on the iPhone, even after the device is out of the communication zone.
Which of the following attacks is performed by Clark in above scenario?


A. IOS trustjacking


B. lOS Jailbreaking


C. Exploiting SS7 vulnerability


D. Man-in-the-disk attack





A.
  IOS trustjacking

During an Xmas scan what indicates a port is closed?


A. No return response


B. RST


C. ACK


D. SYN





B.
  RST

joe works as an it administrator in an organization and has recently set up a cloud computing service for the organization. To implement this service, he reached out to a telecom company for providing Internet connectivity and transport services between the organization and the cloud service provider, in the NIST cloud deployment reference architecture, under which category does the telecom company fall in the above scenario?


A. Cloud booker


B. Cloud consumer


C. Cloud carrier


D. Cloud auditor





C.
  Cloud carrier

Robin, an attacker, is attempting to bypass the firewalls of an organization through the DNS tunneling method in order to exfiltrate data. He is using the NSTX tool for bypassing the firewalls. On which of the following ports should Robin run the NSTX tool?


A. Port 53


B. Port 23


C. Port 50


D. Port 80





A.
  Port 53

To invisibly maintain access to a machine, an attacker utilizes a toolkit that sits undetected In the core components of the operating system. What is this type of rootkit an example of?


A. Mypervisor rootkit


B. Kernel toolkit


C. Hardware rootkit


D. Firmware rootkit





B.
  Kernel toolkit

Gilbert, a web developer, uses a centralized web API to reduce complexity and increase the Integrity of updating and changing data. For this purpose, he uses a web service that uses HTTP methods such as PUT. POST. GET. and DELETE and can improve the overall performance, visibility, scalability, reliability, and portability of an application. What is the type of web-service API mentioned in the above scenario?


A. JSON-RPC


B. SOAP API


C. RESTful API


D. REST API





C.
  RESTful API

E-mail scams and mail fraud are regulated by which of the following?


A. 18 U.S.C. par. 1030 Fraud and Related activity in connection with Computers


B. 18 U.S.C. par. 1029 Fraud and Related activity in connection with Access Devices


C. 18 U.S.C. par. 1362 Communication Lines, Stations, or Systems


D. 18 U.S.C. par. 2510 Wire and Electronic Communications Interception and Interception of Oral Communication





A.
  18 U.S.C. par. 1030 Fraud and Related activity in connection with Computers

Nathan is testing some of his network devices. Nathan is using Macof to try and flood the ARP cache of these switches.
If these switches' ARP cache is successfully flooded, what will be the result?


A. The switches will drop into hub mode if the ARP cache is successfully flooded.


B. If the ARP cache is flooded, the switches will drop into pix mode making it less susceptible to attacks.


C. Depending on the switch manufacturer, the device will either delete every entry in its ARP cache or reroute packets to the nearest switch.


D. The switches will route all traffic to the broadcast address created collisions.





A.
  The switches will drop into hub mode if the ARP cache is successfully flooded.


Page 17 out of 46 Pages
Previous