Go Back on 312-50v11 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-50v11 Practice Test


Page 20 out of 104 Pages

What is the following command used for?
net use \targetipc$ "" /u:""


A.

Grabbing the etc/passwd file


B.

Grabbing the SAM


C.

Connecting to a Linux computer through Samba.


D.

This command is used to connect as a null session


E.

Enumeration of Cisco routers





D.
  

This command is used to connect as a null session



A hacker is an intelligent individual with excellent computer skills and the ability to explore a
computer’s software and hardware without the owner’s permission. Their intention can
either be to simply gain knowledge or to illegally make changes.
Which of the following class of hacker refers to an individual who works both offensively
and defensively at various times?


A.

White Hat


B.

Suicide Hacker


C.

Gray Hat


D.

Black Hat





C.
  

Gray Hat



These hackers have limited or no training and know how to use only basic techniques or
tools.
What kind of hackers are we talking about?


A.

Black-Hat Hackers A


B.

Script Kiddies


C.

White-Hat Hackers


D.

Gray-Hat Hacker





C.
  

White-Hat Hackers



Which of the following steps for risk assessment methodology refers to vulnerability identification?


A.

Determines if any flaws exist in systems, policies, or procedures


B.

Assigns values to risk probabilities; Impact values.


C.

Determines risk probability that vulnerability will be exploited (High. Medium, Low)


D.

Identifies sources of harm to an IT system. (Natural, Human. Environmental)





C.
  

Determines risk probability that vulnerability will be exploited (High. Medium, Low)



Boney, a professional hacker, targets an organization for financial benefits. He performs an
attack by sending his session ID using an MITM attack technique. Boney first obtains a
valid session ID by logging into a service and later feeds the same session 10 to the target
employee. The session ID links the target employee to Boneys account page without
disclosing any information to the victim. When the target employee clicks on the link, all the
sensitive payment details entered in a form are linked to Boneys account. What is the
attack performed by Boney in the above scenario?


A.

Session donation attack


B.

Session fixation attack


C.

Forbidden attack


D.

CRIME attack





A.
  

Session donation attack




Page 20 out of 104 Pages
Previous