Go Back on 312-50v12 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-50v12 Practice Test


Page 18 out of 114 Pages

Topic 1: Exam Pool A

Peter is surfing the internet looking for information about DX Company. Which hacking
process is Peter doing?


A.

Scanning


B.

Footprinting


C.

Enumeration


D.

System Hacking





B.
  

Footprinting



Which type of security feature stops vehicles from crashing through the doors of a building?


A.

Bollards


B.

Receptionist


C.

Mantrap


D.

Turnstile





A.
  

Bollards



What term describes the amount of risk that remains after the vulnerabilities are classified
and the countermeasures have been deployed?


A.

Residual risk


B.

Impact risk


C.

Deferred risk


D.

Inherent risk





A.
  

Residual risk



Explanation:
https://en.wikipedia.org/wiki/Residual_risk
The residual risk is the risk or danger of an action or an event, a method or a (technical)
process that, although being abreast with science, still conceives these dangers, even if all
theoretically possible safety measures would be applied (scientifically conceivable
measures); in other words, the amount of risk left over after natural or inherent risks have
been reduced by risk controls.
· Residual risk = (Inherent risk) – (impact of risk controls)

Bob received this text message on his mobile phone: “Hello, this is Scott Smelby from the
Yahoo Bank. Kindly contact me for a vital transaction on: scottsmelby@yahoo.com”. Which statement below is true?


A.

This is a scam as everybody can get a @yahoo address, not the Yahoo customer
service employees.


B.

This is a scam because Bob does not know Scott.


C.

Bob should write to scottmelby@yahoo.com to verify the identity of Scott.


D.

This is probably a legitimate message as it comes from a respectable organization.





A.
  

This is a scam as everybody can get a @yahoo address, not the Yahoo customer
service employees.



Which of the following algorithms can be used to guarantee the integrity of messages being
sent, in transit, or stored?


A.

symmetric algorithms


B.

asymmetric algorithms


C.

hashing algorithms


D.

integrity algorithms





C.
  

hashing algorithms




Page 18 out of 114 Pages
Previous