Go Back on 312-50v10 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-50v10 Practice Test


Page 19 out of 147 Pages

Topic 1: Exam Pool A

If an attacker uses the command SELECT*FROM user WHERE name = ‘x’ AND userid IS
NULL; -‘; which type of SQL injection attack is the attacker performing?


A.

End of Line Comment


B.

UNION SQL Injection


C.

Illegal/Logically Incorrect Query


D.

Tautology





D.
  

Tautology



When tuning security alerts, what is the best approach?


A.

Tune to avoid False positives and False Negatives


B.

Rise False positives Rise False Negatives


C.

Decrease the false positives


D.

Decrease False negatives





A.
  

Tune to avoid False positives and False Negatives



Which of the following is an adaptive SQL Injection testing technique used to discover
coding errors by inputting massive amounts of random data and observing the changes in
the output?


A.

Function Testing


B.

Dynamic Testing


C.

Static Testing


D.

Fuzzing Testing





D.
  

Fuzzing Testing



From the following table, identify the wrong answer in terms of Range (ft).


A.

802.11b


B.

802.11g


C.

802.16(WiMax)


D.

802.11a





D.
  

802.11a



You are a Penetration Tester and are assigned to scan a server. You need to use a
scanning technique wherein the TCP Header is split into many packets so that it becomes
difficult to detect what the packets are meant for.
Which of the below scanning technique will you use?


A.

ACK flag scanning


B.

TCP Scanning


C.

IP Fragment Scanning


D.

Inverse TCP flag scanning





C.
  

IP Fragment Scanning




Page 19 out of 147 Pages
Previous