Download Certified Ethical Hacker (312-50v9).Examskey.312-50.2018-09-19.1e.320q.vcex

Download Dump

File Info

Exam Certified Ethical Hacker (312-50v9)
Number 312-50
File Name Certified Ethical Hacker (312-50v9).Examskey.312-50.2018-09-19.1e.320q.vcex
Size 2 Mb
Posted September 19, 2018
Downloaded 3



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%





Demo Questions

Question 1
A Security Engineer at a medium-sized accounting firm has been tasked with discovering how much information can be obtained from the firm's public facing web servers. The engineer decides to start by using netcat to port 80. 
The engineer receives this output:

  

Which of the following is an example of what the engineer performed? 

  • A: Cross-site scripting
  • B: Banner grabbing
  • C: SQL injection
  • D: Whois database query



Question 2
An NMAP scan of a server shows port 69 is open. What risk could this pose?

  • A: Unauthenticated access
  • B: Weak SSL version
  • C: Cleartext login
  • D: Web portal data leak



Question 3
What information should an IT system analysis provide to the risk assessor?

  • A: Management buy-in
  • B: Threat statement
  • C: Security architecture
  • D: Impact analysis



Question 4
Which results will be returned with the following Google search query? 
site:target.com -site:Marketing.target.com accounting

  • A: Results matching all words in the query
  • B: Results matching “accounting” in domain target.com but not on the site Marketing.target.com
  • C: Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting
  • D: Results for matches on target.com and Marketing.target.com that include the word “accounting” 



Question 5
A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. 
What is the first step that the bank should take before enabling the audit feature?

  • A: Perform a vulnerability scan of the system.
  • B: Determine the impact of enabling the audit feature.
  • C: Perform a cost/benefit analysis of the audit feature.
  • D: Allocate funds for staffing of audit log review.



Question 6
Which of the following is a preventive control?

  • A: Smart card authentication
  • B: Security policy
  • C: Audit trail
  • D: Continuity of operations plan



Question 7
Which of the following is considered an acceptable option when managing a risk?

  • A: Reject the risk.
  • B: Deny the risk.
  • C: Mitigate the risk.
  • D: Initiate the risk.



Question 8
Which security control role does encryption meet?

  • A: Preventative
  • B: Detective
  • C: Offensive
  • D: Defensive



Question 9
A covert channel is a channel that

  • A: transfers information over, within a computer system, or network that is outside of the security policy.
  • B: transfers information over, within a computer system, or network that is within the security policy.
  • C: transfers information via a communication path within a computer system, or network for transfer of data.
  • D: transfers information over, within a computer system, or network that is encrypted.



Question 10
John the Ripper is a technical assessment tool used to test the weakness of which of the following?

  • A: Usernames
  • B: File permissions
  • C: Firewall rulesets
  • D: Passwords









CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset