Go Back on 312-50v12 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-50v12 Practice Test


Page 4 out of 114 Pages

Topic 1: Exam Pool A

An attacker has installed a RAT on a host. The attacker wants to ensure that when a user
attempts to go to "www.MyPersonalBank.com", the user is directed to a phishing site.
Which file does the attacker need to modify?


A.

Boot.ini


B.

Sudoers


C.

Networks


D.

Hosts





D.
  

Hosts



What kind of detection techniques is being used in antivirus software that identifies
malware by collecting data from multiple protected systems and instead of analyzing files
locally it’s made on the provider’s environment?


A.

Behavioral based


B.

Heuristics based


C.

Honeypot based


D.

Cloud based





D.
  

Cloud based



If a token and 4-digit personal identification number (PIN) are used to access a computer
system and the token performs off-line checking for the correct PIN, what type of attack is
possible?


A.

Birthday


B.

Brute force


C.

Man-in-the-middle


D.

Smurf





B.
  

Brute force



Steve, a scientist who works in a governmental security agency, developed a technological
solution to identify people based on walking patterns and implemented this approach to a
physical control access.
A camera captures people walking and identifies the individuals using Steve’s approach.
After that, people must approximate their RFID badges. Both the identifications are
required to open the door. In this case, we can say:


A.

Although the approach has two phases, it actually implements just one authentication factor


B.

The solution implements the two authentication factors: physical object and physical
characteristic


C.

The solution will have a high level of false positives


D.

Biological motion cannot be used to identify people





B.
  

The solution implements the two authentication factors: physical object and physical
characteristic



is a set of extensions to DNS that provide the origin authentication of DNS data to DNS
clients (resolvers) so as to reduce the threat of DNS poisoning, spoofing, and similar types
of attacks.


A.

DNSSEC


B.

Resource records


C.

Resource transfer


D.

Zone transfer





A.
  

DNSSEC



Explanation:
The Domain Name System Security Extensions (DNSSEC) is a suite of Internet
Engineering Task Force (IETF) specifications for securing certain kinds of information
provided by DNS for use on IP networks. DNSSEC is a set of extensions to DNS provide to
DNS clients (resolvers) origin authentication of DNS data, authenticated denial of
existence, and data integrity, but not availability or confidentiality. DNSSEC is necessary
because the original DNS design did not include security but was designed to be a scalable
distributed system. DNSSEC adds security while maintaining backward compatibility.


Page 4 out of 114 Pages
Previous