312-50v13 Practice Test Questions

551 Questions


Topic 2 : Exam Pool B

Every company needs a formal written document which spells out to employees precisely what they are allowed to use the company's systems for, what is prohibited, and what will happen to them if they break the rules. Two printed copies of the policy should be given to every employee as soon as possible after they join the organization. The employee should be asked to sign one copy, which should be safely filed by the company. No one should be allowed to use the company's computer systems until they have signed the policy in acceptance of its terms.
What is this document called?


A. Information Audit Policy (IAP)


B. Information Security Policy (ISP)


C. Penetration Testing Policy (PTP)


D. Company Compliance Policy (CCP)





B.
  Information Security Policy (ISP)

Richard, an attacker, aimed to hack loT devices connected to a target network. In this process. Richard recorded the frequency required to share information between connected devices. After obtaining the frequency, he captured the original data when commands were initiated by the connected devices. Once the original data were collected, he used free tools such as URH to segregate the command sequence. Subsequently, he started injecting the segregated command sequence on the same frequency into the loT network, which repeats the captured signals of the devices. What Is the type of attack performed by Richard In the above scenario?


A. Side-channel attack


B. Replay attack


C. CrypTanalysis attack


D. Reconnaissance attack





B.
  Replay attack

Log monitoring tools performing behavioral analysis have alerted several suspicious logins on a Linux server occurring during non-business hours. After further examination of all login activities, it is noticed that none of the logins have occurred during typical work hours. A Linux administrator who is investigating this problem realizes the system time on the Linux server is wrong by more than twelve hours. What protocol used on Linux servers to synchronize the time has stopped working?


A. Time Keeper


B. NTP


C. PPP


D. OSPP





B.
  NTP

Nedved is an IT Security Manager of a bank in his country. One day. he found out that there is a security breach to his company's email server based on analysis of a suspicious connection from the email server to an unknown IP Address.
What is the first thing that Nedved needs to do before contacting the incident response team?


A. Leave it as it Is and contact the incident response te3m right away


B. Block the connection to the suspicious IP Address from the firewall


C. Disconnect the email server from the network


D. Migrate the connection to the backup email server





C.
  Disconnect the email server from the network

John is an incident handler at a financial institution. His steps in a recent incident are not up to the standards of the company. John frequently forgets some steps and procedures while handling responses as they are very stressful to perform. Which of the following actions should John take to overcome this problem with the least administrative effort?


A. Create an incident checklist.


B. Select someone else to check the procedures.


C. Increase his technical skills.


D. Read the incident manual every time it occurs.





C.
  Increase his technical skills.

Which command can be used to show the current TCP/IP connections?


A. Netsh


B. Netstat


C. Net use connection


D. Net use





A.
  Netsh

Emily, an extrovert obsessed with social media, posts a large amount of private information, photographs, and location tags of recently visited places. Realizing this. James, a professional hacker, targets Emily and her acquaintances, conducts a location search to detect their geolocation by using an automated tool, and gathers information to perform other sophisticated attacks. What is the tool employed by James in the above scenario?


A. ophcrack


B. Hootsuite


C. VisualRoute


D. HULK





B.
  Hootsuite

You have retrieved the raw hash values from a Windows 2000 Domain Controller. Using social engineering, you come to know that they are enforcing strong passwords. You understand that all users are required to use passwords that are at least 8 characters in length. All passwords must also use 3 of the 4 following categories: lower case letters, capital letters, numbers and special characters. With your existing knowledge of users, likely user account names and the possibility that they will choose the easiest passwords possible, what would be the fastest type of password cracking attack you can run against these hash values and still get results?


A. Online Attack


B. Dictionary Attack


C. Brute Force Attack


D. Hybrid Attack





D.
  Hybrid Attack

Fred is the network administrator for his company. Fred is testing an internal switch. From an external IP address, Fred wants to try and trick this switch into thinking it already has established a session with his computer. How can Fred accomplish this?


A. Fred can accomplish this by sending an IP packet with the RST/SIN bit and the source address of his computer.


B. He can send an IP packet with the SYN bit and the source address of his computer.


C. Fred can send an IP packet with the ACK bit set to zero and the source address of the switch.


D. Fred can send an IP packet to the switch with the ACK bit and the source address of his machine.





D.
  Fred can send an IP packet to the switch with the ACK bit and the source address of his machine.

which of the following Bluetooth hacking techniques refers to the theft of information from a wireless device through Bluetooth?


A. Bluesmacking


B. Bluebugging


C. Bluejacking


D. Bluesnarfing





D.
  Bluesnarfing

What is the first step for a hacker conducting a DNS cache poisoning (DNS spoofing) attack against an organization?


A. The attacker queries a nameserver using the DNS resolver.


B. The attacker makes a request to the DNS resolver.


C. The attacker forges a reply from the DNS resolver.


D. The attacker uses TCP to poison the ONS resofver.





B.
  The attacker makes a request to the DNS resolver.

Nicolas just found a vulnerability on a public-facing system that is considered a zero-day vulnerability. He sent an email to the owner of the public system describing the problem and how the owner can protect themselves from that vulnerability. He also sent an email to Microsoft informing them of the problem that their systems are exposed to. What type of hacker is Nicolas?


A. Red hat


B. white hat


C. Black hat


D. Gray hat





B.
  white hat


Page 19 out of 46 Pages
Previous