Go Back on 312-50v10 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-50v10 Practice Test


Page 7 out of 147 Pages

Topic 1: Exam Pool A

In Wireshark, the packet bytes panes show the data of the current packet in which format?


A.

Decimal


B.

ASCII only


C.

Binary


D.

Hexadecimal





D.
  

Hexadecimal



A virus that attempts to install itself inside the file it is infecting is called?


A.

Tunneling virus


B.

Cavity virus


C.

Polymorphic virus


D.

Stealth virus





B.
  

Cavity virus



Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients.
You are requested to accept the offer and you oblige. After 2 days. Bob denies that he had
ever sent a mail. What do you want to ""know"" to prove yourself that it was Bob who had
send a mail?


A.

Authentication


B.

Confidentiality


C.

Integrity


D.

Non-Repudiation





D.
  

Non-Repudiation



What type of vulnerability/attack is it when the malicious person forces the user’s browser
to send an authenticated request to a server?


A.

Cross-site request forgery


B.

Cross-site scripting


C.

Session hijacking


D.

Server side request forgery





A.
  

Cross-site request forgery



Which one of the following Google advanced search operators allows an attacker to restrict
the results to those websites in the given domain?


A.

[cache:]


B.

 [site:]


C.

[inurl:]


D.

 [link:





B.
  

 [site:]




Page 7 out of 147 Pages
Previous