312-50v13 Practice Test Questions

551 Questions


Topic 1 : Exam Pool A

A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?


A. Perform a vulnerability scan of the system.


B. Determine the impact of enabling the audit feature.


C. Perform a cost/benefit analysis of the audit feature.


D. Allocate funds for staffing of audit log review.





B.
  Determine the impact of enabling the audit feature.

What kind of detection techniques is being used in antivirus software that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it’s made on the provider’s environment?


A. Behavioral based


B. Heuristics based


C. Honeypot based


D. Cloud based





D.
  Cloud based

An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", the user is directed to a phishing site.
Which file does the attacker need to modify?


A. Boot.ini


B. Sudoers


C. Networks


D. Hosts





D.
  Hosts

What is the known plaintext attack used against DES which gives the result that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single key?


A. Man-in-the-middle attack


B. Meet-in-the-middle attack


C. Replay attack


D. Traffic analysis attack





B.
  Meet-in-the-middle attack

The change of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from the last backup to the new hard disk. The recovery person earns $10/hour. Calculate the SLE, ARO, and ALE. Assume the EF = 1(100%). What is the closest approximate cost of this replacement and recovery operation per year?


A. $1320


B. $440


C. $100


D. $146





D.
  $146

Bob is acknowledged as a hacker of repute and is popular among visitors of "underground" sites. Bob is willing to share his knowledge with those who are willing to learn, and many have expressed their interest in learning from him. However, this knowledge has a risk associated with it, as it can be used for malevolent attacks as well. In this context, what would be the most effective method to bridge the knowledge gap between the "black" hats or crackers and the "white" hats or computer security professionals? (Choose the test answer.)


A. Educate everyone with books, articles and training on risk analysis, vulnerabilities and safeguards.


B. Hire more computer security monitoring personnel to monitor computer systems and networks.


C. Make obtaining either a computer security certification or accreditation easier to achieve so more individuals feel that they are a part of something larger than life.


D. Train more National Guard and reservist in the art of computer security to help out in times of emergency or crises.





A.
  Educate everyone with books, articles and training on risk analysis, vulnerabilities and safeguards.

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?


A. ESP transport mode


B. ESP confidential


C. AH permiscuous


D. AH Tunnel mode





A.
  ESP transport mode

What is the way to decide how a packet will move from an untrusted outside host to a protected inside that is behind a firewall, which permits the hacker to determine which ports are open and if the packets can pass through the packet-filtering of the firewall?


A. Session hijacking


B. Firewalking


C. Man-in-the middle attack


D. Network sniffing





B.
  Firewalking

A company’s policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department. Using Wireshark to examine the captured traffic, which command can be used as display filter to find unencrypted file transfers?


A. tcp.port = = 21


B. tcp.port = 23


C. tcp.port = = 21 | | tcp.port = =22


D. tcp.port ! = 21





A.
  tcp.port = = 21

CompanyXYZ has asked you to assess the security of their perimeter email gateway. From your office in New York, you craft a specially formatted email message and send it across the Internet to an employee of CompanyXYZ. The employee of CompanyXYZ is aware of your test. Your email message looks like this:
From: jim_miller@companyxyz.com
To: michelle_saunders@companyxyz.com Subject: Test message
Date: 4/3/2017 14:37
The employee of CompanyXYZ receives your email message.
This proves that CompanyXYZ’s email gateway doesn’t prevent what?


A. Email Masquerading


B. Email Harvesting


C. Email Phishing


D. Email Spoofing





D.
  Email Spoofing

You have the SOA presented below in your Zone. Your secondary servers have not been able to contact your primary server to synchronize information. How long will the secondary servers attempt to contact the primary server before it considers that zone is dead and stops responding to queries?
collegae.edu.SOA, cikkye.edu ipad.college.edu. (200302028 3600 3600 604800 3600)


A. One day


B. One hour


C. One week


D. One month





C.
  One week

An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the network’s external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file. What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?


A. Protocol analyzer


B. Network sniffer


C. Intrusion Prevention System (IPS)


D. Vulnerability scanner





A.
  Protocol analyzer


Page 7 out of 46 Pages
Previous