Go Back on 312-50v11 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-50v11 Practice Test


Page 23 out of 104 Pages

The network users are complaining because their system are slowing down. Further, every
time they attempt to go a website, they receive a series of pop-ups with advertisements.
What types of malware have the system been infected with?


A.

Virus


B.

Spyware


C.

Trojan


D.

Adware





D.
  

Adware



Explanation:
Adware, or advertising supported computer code, is computer code that displays unwanted
advertisements on your pc. Adware programs can tend to serve you pop-up ads, will
modification your browser’s homepage, add spyware and simply bombard your device with
advertisements. Adware may be a additional summary name for doubtless unwanted
programs. It’s roughly a virulent disease and it’s going to not be as clearly malicious as a
great deal of different problematic code floating around on the net. create no mistake
concerning it, though, that adware has to return off of no matter machine it’s on. Not solely
will adware be extremely annoying whenever you utilize your machine, it might additionally
cause semipermanent problems for your device.
Adware a network users the browser to gather your internet browsing history so as to
’target’ advertisements that appear tailored to your interests. At their most innocuous,
adware infections square measure simply annoying. as an example, adware barrages you
with pop-up ads that may create your net expertise markedly slower and additional labor
intensive.

Null sessions are un-authenticated connections (not using a username or password.) to an
NT or 2000 system. Which TCP and UDP ports must you filter to check null sessions on
your network?


A.

137 and 139


B.

137 and 443


C.

139 and 443


D.

139 and 445





D.
  

139 and 445



The company ABC recently contracts a new accountant. The accountant will be working
with the financial statements. Those financial statements need to be approved by the CFO
and then they will be sent to the accountant but the CFO is worried because he wants to be
sure that the information sent to the accountant was not modified once he approved it.
Which of the following options can be useful to ensure the integrity of the data?


A.

The CFO can use a hash algorithm in the document once he approved the financial statements


B.

The CFO can use an excel file with a password


C.

The financial statements can be sent twice, one by email and the other delivered in USB and the accountant can compare both to be sure is the same document


D.

The document can be sent to the accountant using an exclusive USB for that document





A.
  

The CFO can use a hash algorithm in the document once he approved the financial statements



Attacker Lauren has gained the credentials of an organization's internal server system, and she was often logging in during irregular times to monitor the network activities. The organization was skeptical about the login times and appointed security professional Robert to determine the issue. Robert analyzed the compromised device to find incident details such as the type of attack, its severity, target, impact, method of propagation, and
vulnerabilities exploited. What is the incident handling and response (IH&R) phase, in which Robert has determined these issues?


A.

Preparation


B.

Eradication


C.

Incident recording and assignment


D.

Incident triage





C.
  

Incident recording and assignment



Peter is surfing the internet looking for information about DX Company. Which hacking process is Peter doing?


A.

Scanning


B.

Footprinting


C.

Enumeration


D.

System Hacking





B.
  

Footprinting




Page 23 out of 104 Pages
Previous