Go Back on 312-50v11 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-50v11 Practice Test


Page 6 out of 104 Pages

Bob is doing a password assessment for one of his clients. Bob suspects that security
policies are not in place. He also suspects that weak passwords are probably the norm
throughout the company he is evaluating. Bob is familiar with password weaknesses and
key loggers.
Which of the following options best represents the means that Bob can adopt to retrieve
passwords from his clients hosts and servers?


A.

Hardware, Software, and Sniffing.


B.

Hardware and Software Keyloggers.


C.

Passwords are always best obtained using Hardware key loggers.


D.

Software only, they are the most effective.





A.
  

Hardware, Software, and Sniffing.



During a recent security assessment, you discover the organization has one Domain Name
Server (DNS) in a Demilitarized Zone (DMZ) and a second DNS server on the internal network.
What is this type of DNS configuration commonly called?


A.

DynDNS


B.

DNS Scheme


C.

DNSSEC


D.

Split DNS





D.
  

Split DNS



Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?


A.

To determine who is the holder of the root account


B.

To perform a DoS


C.

To create needless SPAM


D.

To illicit a response back that will reveal information about email servers and how they treat undeliverable mail


E.

To test for virus protection





D.
  

To illicit a response back that will reveal information about email servers and how they treat undeliverable mail



Emily, an extrovert obsessed with social media, posts a large amount of private
information, photographs, and location tags of recently visited places. Realizing this.
James, a professional hacker, targets Emily and her acquaintances, conducts a location
search to detect their geolocation by using an automated tool, and gathers information toperform other sophisticated attacks. What is the tool employed by James in the above
scenario?


A.

ophcrack


B.

Hootsuite


C.

VisualRoute


D.

HULK





B.
  

Hootsuite



Explanation: Hootsuite may be a social media management platform that covers virtually
each side of a social media manager’s role.
With only one platform users area unit ready to do the easy stuff like reverend cool content
and schedule posts on social media in all the high to managing team members and
measure ROI.
There area unit many totally different plans to decide on from, from one user set up up to a
bespoken enterprise account that’s appropriate for much larger organizations.

Which of the following statements about a zone transfer is correct? (Choose three.)


A.

A zone transfer is accomplished with the DNS


B.

A zone transfer is accomplished with the nslookup service


C.

A zone transfer passes all zone information that a DNS server maintains


D.

A zone transfer passes all zone information that a nslookup server maintains


E.

A zone transfer can be prevented by blocking all inbound TCP port 53 connections


F.

Zone transfers cannot occur on the Internet





A.
  

A zone transfer is accomplished with the DNS



C.
  

A zone transfer passes all zone information that a DNS server maintains



E.
  

A zone transfer can be prevented by blocking all inbound TCP port 53 connections




Page 6 out of 104 Pages
Previous