Go Back on 312-50v11 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-50v11 Practice Test


Page 5 out of 104 Pages

What is the proper response for a NULL scan if the port is open?


A.

SYN


B.

ACK


C.

FIN


D.

PSH


E.

RST


F.

No response





F.
  

No response



Why containers are less secure that virtual machines?


A.

Host OS on containers has a larger surface attack.


B.

Containers may full fill disk space of the host.


C.

A compromise container may cause a CPU starvation of the host.


D.

Containers are attached to the same virtual network.





A.
  

Host OS on containers has a larger surface attack.



An organization is performing a vulnerability assessment tor mitigating threats. James, a
pen tester, scanned the organization by building an inventory of the protocols found on the
organization's machines to detect which ports are attached to services such as an email
server, a web server or a database server. After identifying the services, he selected the
vulnerabilities on each machine and started executing only the relevant tests. What is the
type of vulnerability assessment solution that James employed in the above scenario?


A.

Product-based solutions


B.

Tree-based assessment


C.

Service-based solutions


D.

inference-based assessment





C.
  

Service-based solutions



PGP, SSL, and IKE are all examples of which type of cryptography?


A.

Digest


B.

Secret Key


C.

Public Key


D.

Hash Algorithm





C.
  

Public Key



What is the first step for a hacker conducting a DNS cache poisoning (DNS spoofing) attack against an organization?


A.

The attacker queries a nameserver using the DNS resolver.


B.

The attacker makes a request to the DNS resolver.


C.

The attacker forges a reply from the DNS resolver.


D.

The attacker uses TCP to poison the ONS resofver





A.
  

The attacker queries a nameserver using the DNS resolver.




Page 5 out of 104 Pages
Previous