Go Back on 312-50v10 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-50v10 Practice Test


Page 5 out of 147 Pages

Topic 1: Exam Pool A

Which of the following types of jailbreaking allows user-level access but does not allow
iboot-level access?


A.

Bootrom Exploit


B.

iBoot Exploit


C.

Sandbox Exploit


D.

Userland Exploit





D.
  

Userland Exploit



The security administrator of ABC needs to permit Internet traffic in the host 10.0.0.2 and
UDP traffic in the host 10.0.0.3. He also needs to permit all FTP traffic to the rest of the
network and deny all other traffic. After he applied his ACL configuration in the router,
nobody can access to the ftp, and the permitted hosts cannot access the Internet.
According to the next configuration, what is happening in the network?


A.

The ACL 104 needs to be first because is UDP


B.

The ACL 110 needs to be changed to port 80


C.

The ACL for FTP must be before the ACL 110


D.

The first ACL is denying all TCP traffic and the other ACLs are being ignored by the
router





D.
  

The first ACL is denying all TCP traffic and the other ACLs are being ignored by the
router



What is one of the advantages of using both symmetric and asymmetric cryptography in
SSL/TLS?


A.

Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.


B.

Asymmetric cryptography is computationally expensive in comparison. However, it is
well-suited to securely negotiate keys for use with symmetric cryptography.


C.

Symmetric encryption allows the server to securely transmit the session keys out-ofband.


D.

Supporting both types of algorithms allows less-powerful devices such as mobile phones
to use symmetric encryption instead.





D.
  

Supporting both types of algorithms allows less-powerful devices such as mobile phones
to use symmetric encryption instead.



Developers at your company are creating a web application which will be available for use
by anyone on the Internet, The developers have taken the approach of implementing a
Three-Tier Architecture for the web application. The developers are now asking you which
network should the Presentation Tier (front- end web server) be placed in?


A.

 isolated vlan network


B.

Mesh network


C.

DMZ network


D.

Internal network





A.
  

 isolated vlan network



Analyst is investigating proxy logs and found out that one of the internal user visited
website storing suspicious Java scripts. After opening one of them, he noticed that it is very hard to understand the code and that all codes differ from the typical Java script. What is
the name of this technique to hide the code and extend analysis time?


A.

Encryption


B.

Code encoding


C.

Obfuscation


D.

Steganography





A.
  

Encryption




Page 5 out of 147 Pages
Previous