Go Back on 312-50v11 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-50v11 Practice Test


Page 22 out of 104 Pages

An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", the user is directed to a phishing site. Which file does the attacker need to modify?


A.

Boot.ini


B.

Sudoers


C.

Networks


D.

Hosts





D.
  

Hosts



Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?


A.

ESP transport mode


B.

ESP confidential


C.

AH permiscuous


D.

AH Tunnel mode





A.
  

ESP transport mode



Steve, an attacker, created a fake profile on a social media website and sent a request to
Stella. Stella was enthralled by Steve's profile picture and the description given for his
profile, and she initiated a conversation with him soon after accepting the request. After a
few days. Sieve started asking about her company details and eventually gathered all the
essential information regarding her company. What is the social engineering technique
Steve employed in the above scenario?


A.

Diversion theft


B.

Baiting


C.

Honey trap


D.

Piggybacking





D.
  

Piggybacking



Nedved is an IT Security Manager of a bank in his country. One day. he found out that
there is a security breach to his company's email server based on analysis of a suspicious
connection from the email server to an unknown IP Address.
What is the first thing that Nedved needs to do before contacting the incident response
team?


A.

Leave it as it Is and contact the incident response te3m right away


B.

Block the connection to the suspicious IP Address from the firewall


C.

Disconnect the email server from the network


D.

Migrate the connection to the backup email server





C.
  

Disconnect the email server from the network



In the field of cryptanalysis, what is meant by a “rubber-hose” attack?


A.

Forcing the targeted keystream through a hardware-accelerated device such as an ASIC.


B.

A backdoor placed into a cryptographic algorithm by its creator.


C.

Extraction of cryptographic secrets through coercion or torture.


D.

Attempting to decrypt ciphertext by making logical assumptions about the contents of the original plaintext.





C.
  

Extraction of cryptographic secrets through coercion or torture.




Page 22 out of 104 Pages
Previous