Go Back on 312-50v10 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-50v10 Practice Test


Page 18 out of 147 Pages

Topic 1: Exam Pool A

In which of the following password protection technique, random strings of characters are
added to the password before calculating their hashes?


A.

Keyed Hashing


B.

Key Stretching


C.

Salting


D.

Double Hashing





C.
  

Salting



Email is transmitted across the Internet using the Simple Mail Transport Protocol. SMTP
does not encrypt email, leaving the information in the message vulnerable to being read by
an unauthorized person. SMTP can upgrade a connection between two mail servers to use
TLS. Email transmitted by SMTP over TLS is encrypted. What is the name of the command
used by SMTP to transmit email over TLS?


A.

OPPORTUNISTICTLS STARTTLS


B.

FORCETLS


C.

UPGRADETLS





B.
  

FORCETLS



You are the Network Admin, and you get a compliant that some of the websites are no
longer accessible. You try to ping the servers and find them to be reachable. Then you type
the IP address and then you try on the browser, and find it to be accessible. But they are
not accessible when you try using the URL.
What may be the problem?


A.

Traffic is Blocked on UDP Port 53


B.

Traffic is Blocked on UDP Port 80


C.

Traffic is Blocked on UDP Port 54


D.

Traffic is Blocked on UDP Port 80





A.
  

Traffic is Blocked on UDP Port 53



Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?


A.

123


B.

161


C.

69


D.

113





A.
  

123



The network team has well-established procedures to follow for creating new rules on the
firewall. This includes having approval from a manager prior to implementing any new
rules. While reviewing the firewall configuration, you notice a recently implemented rule but
cannot locate manager approval for it. What would be a good step to have in the
procedures for a situation like this?


A.

Have the network team document the reason why the rule was implemented without
prior manager approval.


B.

Monitor all traffic using the firewall rule until a manager can approve it.


C.

Do not roll back the firewall rule as the business may be relying upon it, but try to get
manager approval as soon as possible.


D.

Immediately roll back the firewall rule until a manager can approve it





D.
  

Immediately roll back the firewall rule until a manager can approve it




Page 18 out of 147 Pages
Previous