Discount Offer
Go Back on 312-50v12 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

312-50v12 Practice Test

Whether you're a beginner or brushing up on skills, our 312-50v12 practice exam is your key to success. Our comprehensive question bank covers all key topics, ensuring you’re fully prepared.


Page 2 out of 114 Pages

Topic 1: Exam Pool A

Bob, a network administrator at BigUniversity, realized that some students are connecting
their notebooks in the wired network to have Internet access. In the university campus,
there are many Ethernet ports available for professors and authorized visitors but not for
students.
He identified this when the IDS alerted for malware activities in the network. What should
Bob do to avoid this problem?


A.

Disable unused ports in the switches


B.

Separate students in a different VLAN


C.

Use the 802.1x protocol


D.

Ask students to use the wireless network





You have gained physical access to a Windows 2008 R2 server which has an accessible
disc drive. When you attempt to boot the server and log in, you are unable to guess the
password. In your toolkit, you have an Ubuntu 9.10 Linux LiveCD. Which Linux-based tool
can change any user’s password or activate disabled Windows accounts?


A.

John the Ripper


B.

SET


C.

CHNTPW


D.

Cain & Abel





What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming
through the firewall if your network is comprised of Windows NT, 2000, and XP?


A.

110


B.

135


C.

139


D.

161


E.

445


F.

1024





What is not a PCI compliance recommendation?


A.

Use a firewall between the public network and the payment card data.


B.

Use encryption to protect all transmission of card holder data over any public network.


C.

Rotate employees handling credit card transactions on a yearly basis to different
departments.


D.

Limit access to card holder data to as few individuals as possible.





A hacker is an intelligent individual with excellent computer skills and the ability to explore a
computer’s software and hardware without the owner’s permission. Their intention can
either be to simply gain knowledge or to illegally make changes.
Which of the following class of hacker refers to an individual who works both offensively
and defensively at various times?


A.

White Hat


B.

Suicide Hacker


C.

Gray Hat


D.

Black Hat






Page 2 out of 114 Pages
Previous