Go Back on 312-50v11 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-50v11 Practice Test


Page 11 out of 104 Pages

What does the –oX flag do in an Nmap scan?


A.

Perform an eXpress scan


B.

Output the results in truncated format to the screen


C.

Output the results in XML format to a file


D.

Perform an Xmas scan





C.
  

Output the results in XML format to a file



DNS cache snooping is a process of determining if the specified resource address is
present in the DNS cache records. It may be useful during the examination of the network
to determine what software update resources are used, thus discovering what software is
installed.
What command is used to determine if the entry is present in DNS cache?


A.

nslookup -fullrecursive update.antivirus.com


B.

dnsnooping –rt update.antivirus.com


C.

nslookup -norecursive update.antivirus.com


D.

dns --snoop update.antivirus.com





C.
  

nslookup -norecursive update.antivirus.com



Ethical backer jane Doe is attempting to crack the password of the head of the it
department of ABC company. She Is utilizing a rainbow table and notices upon entering a
password that extra characters are added to the password after submitting. What
countermeasure is the company using to protect against rainbow tables?


A.

Password key hashing


B.

Password salting


C.

Password hashing


D.

Account lockout





B.
  

Password salting



Explanation: Passwords are usually delineated as “hashed and salted”. salting is simply
the addition of a unique, random string of characters renowned solely to the site to every
parole before it’s hashed, typically this “salt” is placed in front of each password.
The salt value needs to be hold on by the site, which means typically sites use the same
salt for each parole. This makes it less effective than if individual salts are used.
The use of unique salts means that common passwords shared by multiple users – like
“123456” or “password” – aren’t revealed revealed when one such hashed password is
known – because despite the passwords being the same the immediately and hashed
values are not.
Large salts also protect against certain methods of attack on hashes, including rainbow
tables or logs of hashed passwords previously broken.
Both hashing and salting may be repeated more than once to increase the issue in
breaking the security.

An attacker is trying to redirect the traffic of a small office. That office is using their own
mail server, DNS server and NTP server because of the importance of their job. The
attacker gain access to the DNS server and redirect the direction www.google.com to his
own IP address. Now when the employees of the office want to
go to Google they are being redirected to the attacker machine. What is the name of this
kind of attack?


A.

MAC Flooding


B.

Smurf Attack


C.

DNS spoofing


D.

ARP Poisoning





C.
  

DNS spoofing



Which of the following is a low-tech way of gaining unauthorized access to systems?


A.

Social Engineering


B.

Eavesdropping


C.

Scanning


D.

Sniffing





A.
  

Social Engineering




Page 11 out of 104 Pages
Previous