Go Back on 312-50v10 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-50v10 Practice Test


Page 2 out of 147 Pages

Topic 1: Exam Pool A

Which component of IPsec performs protocol-level functions that are required to encrypt
and decrypt the packets?


A.

Internet Key Exchange (IKE)


B.

Oakley


C.

 IPsec Policy Agent


D.

IPsec driver





A.
  

Internet Key Exchange (IKE)



You are monitoring the network of your organizations. You notice that:
Which of the following solution will you suggest?


A.

 Block the Blacklist IP’s @ Firewall


B.

Update the Latest Signatures on your IDS/IPS


C.

Clean the Malware which are trying to Communicate with the External Blacklist IP’s


D.

Both B and C





D.
  

Both B and C



An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML
code to embed a malicious applet in all HTTP connections.
When users accessed any page, the applet ran and exploited many machines.
Which one of the following tools the hacker probably used to inject HTML code?


A.

Wireshark


B.

Ettercap


C.

ircrack-ng


D.

Tcpdump





B.
  

Ettercap



You are a security officer of a company. You had an alert from IDS that indicates that one
PC on your Intranet is connected to a blacklisted IP address (C2 Server) on the Internet.
The IP address was blacklisted just before the alert. You are staring an investigation to
roughly analyze the severity of the situation. Which of the following is appropriate to
analyze?


A.

Event logs on the PC


B.

Internet Firewall/Proxy log


C.

IDS log


D.

Event logs on domain controller





B.
  

Internet Firewall/Proxy log



Chandler works as a pen-tester in an IT-firm in New York. As a part of detecting viruses in
the systems, he uses a detection method where the anti-virus executes the malicious
codes on a virtual machine to simulate CPU and memory activities.
Which type of virus detection method did Chandler use in this context?


A.

 Heuristic Analysis


B.

Code Emulation


C.

Integrity checking


D.

Scanning





B.
  

Code Emulation




Page 2 out of 147 Pages
Previous