Go Back on 312-50v10 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-50v10 Practice Test


Page 10 out of 147 Pages

Topic 1: Exam Pool A

What would you enter, if you wanted to perform a stealth scan using Nmap?


A.

nmap -sU


B.

nmap -sS


C.

nmap -sM


D.

nmap -sT





B.
  

nmap -sS



Sam is working as s pen-tester in an organization in Houston. He performs penetration
testing on IDS in order to find the different ways an attacker uses to evade the IDS. Sam
sends a large amount of packets to the target IDS that generates alerts, which enable Sam
to hide the real traffic. What type of method is Sam using to evade IDS?


A.

Denial-of-Service


B.

False Positive Generation


C.

Insertion Attack


D.

Obfuscating





B.
  

False Positive Generation



Company XYZ has asked you to assess the security of their perimeter email gateway.
From your office in New York, you craft a specially formatted email message and send it
across the Internet to an employee of Company XYZ. The employee of Company XYZ is
aware of your test.
Your email message looks like this:
From: jim_miller@companyxyz.com
To: michelle_saunders@companyxyz.com
Subject: Test message
Date: 4/3/2017 14:37
The employee of Company XYZ receives your email message. This proves that Company
XYZ's email gateway doesn't prevent what?


A.

Email Phishing


B.

Email Masquerading


C.

Email Spoofing


D.

Email Harvesting





C.
  

Email Spoofing



Which of the below hashing functions are not recommended for use?


A.

SHA-1.ECC


B.

MD5, SHA-1


C.

SHA-2. SHA-3


D.

MD5. SHA-5





A.
  

SHA-1.ECC



A company's policy requires employees to perform file transfers using protocols which
encrypt traffic. You suspect some employees are still performing file transfers using
unencrypted protocols because the employees do not like changes. You have positioned a
network sniffer to capture traffic from the laptops used by employees in the data ingest
department. Using Wire shark to examine the captured traffic, which command can be
used as a display filter to find unencrypted file transfers?


A.

tcp.port != 21


B.

tcp.port = 23


C.

tcp.port ==21


D.

tcp.port ==21 || tcp.port ==22





D.
  

tcp.port ==21 || tcp.port ==22




Page 10 out of 147 Pages
Previous