Go Back on 312-50v10 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-50v10 Practice Test


Page 11 out of 147 Pages

Topic 1: Exam Pool A

You need a tool that can do network intrusion prevention and intrusion detection, function
as a network sniffer, and record network activity, what tool would you most likely select?


A.

Nmap


B.

Cain & Abel


C.

Nessus


D.

Snort





D.
  

Snort



Which of the following attacks exploits web age vulnerabilities that allow an attacker to
force an unsuspecting user’s browser to send malicious requests they did not intend?


A.

Command Injection Attacks


B.

File Injection Attack


C.

Cross-Site Request Forgery (CSRF)


D.

Hidden Field Manipulation Attack





C.
  

Cross-Site Request Forgery (CSRF)



DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which
security feature on switches leverages the DHCP snooping database to help prevent manin-
the-middle attacks?


A.

Port security


B.

A Layer 2 Attack Prevention Protocol (LAPP)


C.

Dynamic ARP inspection (DAI)


D.

Spanning tree





C.
  

Dynamic ARP inspection (DAI)



The collection of potentially actionable, overt, and publicly available information is known
as


A.

Open-source intelligence


B.

Human intelligence


C.

Social intelligence


D.

Real intelligence





A.
  

Open-source intelligence



Some clients of TPNQM SA were redirected to a malicious site when they tried to access
the TPNQM main site. Bob, a system administrator at TPNQM SA, found that they were
victims of DNS Cache Poisoning.
What should Bob recommend to deal with such a threat?


A.

The use of security agents in clients’ computers


B.

The use of DNSSEC


C.

The use of double-factor authentication


D.

Client awareness





B.
  

The use of DNSSEC




Page 11 out of 147 Pages
Previous