Discount Offer
Go Back on 312-49v9 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

312-49v9 Practice Test


Page 2 out of 98 Pages

Topic 1: Exam Set A

When the operating system marks cluster as used, but does not allocate them to any file,
such clusters are known as ___________.


A.

 Lost clusters


B.

Bad clusters


C.

Empty clusters


D.

Unused clusters





A.
  

 Lost clusters



Attackers can manipulate variables that reference files with "dot-dot-slash (./)" sequences and their variations such as
http://www.juggyDoy.corn/GET/process.php./././././././././etc/passwd.
Identify the attack referred.


A.

Directory traversal


B.

SQL Injection


C.

XSS attack


D.

File injection





A.
  

Directory traversal



Attacker uses vulnerabilities in the authentication or session management functions such
as exposed accounts, session IDs, logout, password management, timeouts, remember
me. secret question, account update etc. to impersonate users, if a user simply closes the
browser without logging out from sites accessed through a public computer, attacker can
use the same browser later and exploit the user's privileges. Which of the following
vulnerability/exploitation is referred above?


A.

Session ID in URLs


B.

Timeout Exploitation


C.

I/O exploitation


D.

Password Exploitation





B.
  

Timeout Exploitation



Digital evidence validation involves using a hashing algorithm utility to create a binary or
hexadecimal number that represents the uniqueness of a data set, such as a disk drive or
file.
Which of the following hash algorithms produces a message digest that is 128 bits long?


A.

CRC-32


B.

MD5


C.

SHA-1


D.

 SHA-512





D.
  

 SHA-512



JPEG is a commonly used method of compressing photographic Images. It uses a
compression algorithm to minimize the size of the natural image, without affecting the
quality of the image. The JPEG lossy algorithm divides the image in separate blocks
of____________.


A.

4x4 pixels


B.

8x8 pixels


C.

16x16 pixels


D.

32x32 pixels





B.
  

8x8 pixels




Page 2 out of 98 Pages
Previous