Go Back on 312-50v10 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-50v10 Practice Test


Page 8 out of 147 Pages

Topic 1: Exam Pool A

Based on the below log, which of the following sentences are true?
Mar 1, 2016, 7:33:28 AM 10.240.250.23 – 54373 10.249.253.15 – 22 tcp_ip


A.

SSH communications are encrypted it’s impossible to know who is the client or the
server


B.

 Application is FTP and 10.240.250.23 is the client and 10.249.253.15 is the server


C.

Application is SSH and 10.240.250.23 is the client and 10.249.253.15 is the server


D.

Application is SSH and 10.240.250.23 is the server and 10.249.253.15 is the server





C.
  

Application is SSH and 10.240.250.23 is the client and 10.249.253.15 is the server



Log monitoring tools performing behavioral analysis have alerted several suspicious logins
on a Linux server occurring during non-business hours. After further examination of all login
activities, it is noticed that none of the logins have occurred during typical work hours. A
Linux administrator who is investigating this problem realizes the system time on the Linux
server is wrong by more than twelve hours. What protocol used on Linux servers to
synchronize the time has stopped working?


A.

Time Keeper


B.

NTP


C.

PPP


D.

OSPP





B.
  

NTP



Alice encrypts her data using her public key PK and stores the encrypted data in the cloud.
Which of the following attack scenarios will compromise the privacy of her data?


A.

None of these scenarios compromise the privacy of Alice’s data


B.

Agent Andrew subpoenas Alice, forcing her to reveal her private key. However, the
cloud server successfully resists Andrew’s attempt to access the stored data


C.

Hacker Harry breaks into the cloud server and steals the encrypted data


D.

Alice also stores her private key in the cloud, and Harry breaks into the cloud server as
before





D.
  

Alice also stores her private key in the cloud, and Harry breaks into the cloud server as
before



In the field of cryptanalysis, what is meant by a “rubber-hose" attack?


A.

Attempting to decrypt cipher text by making logical assumptions about the contents of
the original plain text.


B.

Extraction of cryptographic secrets through coercion or torture.


C.

Forcing the targeted key stream through a hardware-accelerated device such as an
ASIC.


D.

A backdoor placed into a cryptographic algorithm by its creator.





B.
  

Extraction of cryptographic secrets through coercion or torture.



Which of the following Bluetooth hacking techniques does an attacker use to send
messages to users without the recipient’s consent, similar to email spamming?


A.

Bluesmacking


B.

Bluesniffing


C.

Bluesnarfing


D.

Bluejacking





D.
  

Bluejacking




Page 8 out of 147 Pages
Previous