Download Certified Ethical Hacker (312-50v9).312-50.PracticeTest.2018-04-24.399q.vcex

Vendor: ECCouncil
Exam Code: 312-50
Exam Name: Certified Ethical Hacker (312-50v9)
Date: Apr 24, 2018
File Size: 3 MB
Downloads: 1

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
A Network Administrator was recently promoted to Chief Security Officer at a local university. One of employee's new responsibilities is to manage the implementation of an RFID card access system to a new server room on campus. The server room will house student enrollment information that is securely backed up to an off-site location. 
During a meeting with an outside consultant, the Chief Security Officer explains that he is concerned that the existing security controls have not been designed properly. Currently, the Network Administrator is responsible for approving and issuing RFID card access to the server room, as well as reviewing the electronic access logs on a weekly basis. 
Which of the following is an issue with the situation?
  1. Segregation of duties
  2. Undue influence
  3. Lack of experience
  4. Inadequate disaster recovery plan
Correct answer: A
Question 2
What is the most secure way to mitigate the theft of corporate information from a laptop that was left in a hotel room?
  1. Set a BIOS password.
  2. Encrypt the data on the hard drive.
  3. Use a strong logon password to the operating system.
  4. Back up everything on the laptop and store the backup in a safe place.
Correct answer: B
Question 3
In the software security development life cycle process, threat modeling occurs in which phase?
  1. Design
  2. Requirements
  3. Verification
  4. Implementation
Correct answer: A
Question 4
A network administrator received an administrative alert at 3:00 a.m. from the intrusion detection system. The alert was generated because a large number of packets were coming into the network over ports 20 and 21. During analysis, there were no signs of attack on the FTP servers. How should the administrator classify this situation?
  1. True negatives
  2. False negatives
  3. True positives
  4. False positives
Correct answer: D
Question 5
Which of the following techniques does a vulnerability scanner use in order to detect a vulnerability on a target service?
  1. Port scanning
  2. Banner grabbing
  3. Injecting arbitrary data
  4. Analyzing service response
Correct answer: D
Question 6
Which of the following business challenges could be solved by using a vulnerability scanner?
  1. Auditors want to discover if all systems are following a standard naming convention.
  2. A web server was compromised and management needs to know if any further systems were compromised.
  3. There is an emergency need to remove administrator access from multiple machines for an employee that quit.
  4. There is a monthly requirement to test corporate compliance with host application usage and security policies.
Correct answer: D
Question 7
A security policy will be more accepted by employees if it is consistent and has the support of
  1. coworkers.
  2. executive management.
  3. the security officer.
  4. a supervisor.
Correct answer: B
Question 8
A company has hired a security administrator to maintain and administer Linux and Windows-based systems. Written in the nightly report file is the following:
Firewall log files are at the expected value of 4 MB. The current time is 12am. Exactly two hours later the size has decreased considerably. Another hour goes by and the log files have shrunk in size again. 
Which of the following actions should the security administrator take?
  1. Log the event as suspicious activity and report this behavior to the incident response team immediately.
  2. Log the event as suspicious activity, call a manager, and report this as soon as possible.
  3. Run an anti-virus scan because it is likely the system is infected by malware.
  4. Log the event as suspicious activity, continue to investigate, and act according to the site's security policy.
Correct answer: D
Question 9
Which type of scan measures a person's external features through a digital video camera?
  1. Iris scan
  2. Retinal scan
  3. Facial recognition scan
  4. Signature kinetics scan
Correct answer: C
Question 10
WPA2 uses AES for wireless data encryption at which of the following encryption levels?
  1. 64 bit and CCMP
  2. 128 bit and CRC
  3. 128 bit and CCMP
  4. 128 bit and TKIP
Correct answer: C
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!