Go Back on 312-50v12 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-50v12 Practice Test


Page 28 out of 114 Pages

Topic 1: Exam Pool A

One of your team members has asked you to analyze the following SOA record. What is
the version?
Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800
2400.) (Choose four.)


A.

200303028


B.

3600


C.

604800


D.

2400


E.

60


F.

4800





A.
  

200303028



Which of the following tools can be used for passive OS fingerprinting?


A.

nmap


B.

tcpdump


C.

tracert


D.

ping





B.
  

tcpdump



Why is a penetration test considered to be more thorough than vulnerability scan?


A.

Vulnerability scans only do host discovery and port scanning by default.


B.

A penetration test actively exploits vulnerabilities in the targeted infrastructure, while a
vulnerability scan does not typically involve active exploitation.


C.

It is not – a penetration test is often performed by an automated tool, while a
vulnerability scan requires active engagement.


D.

The tools used by penetration testers tend to have much more comprehensive
vulnerability databases.





B.
  

A penetration test actively exploits vulnerabilities in the targeted infrastructure, while a
vulnerability scan does not typically involve active exploitation.



Which definition among those given below best describes a covert channel?


A.

A server program using a port that is not well known.


B.

Making use of a protocol in a way it is not intended to be used.


C.

It is the multiplexing taking place on a communication link.


D.

It is one of the weak channels used by WEP which makes it insecure





B.
  

Making use of a protocol in a way it is not intended to be used.



The configuration allows a wired or wireless network interface controller to pass all traffic it
receives to the Central Processing Unit (CPU), rather than passing only the frames that the
controller is intended to receive. Which of the following is being described?


A.

Multi-cast mode


B.

Promiscuous mode


C.

WEM


D.

Port forwarding





B.
  

Promiscuous mode




Page 28 out of 114 Pages
Previous