Go Back on 312-50v12 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-50v12 Practice Test


Page 8 out of 114 Pages

Topic 1: Exam Pool A

Which of the following tools are used for enumeration? (Choose three.)


A.

SolarWinds


B.

USER2SID


C.

Cheops


D.

SID2USER


E.

DumpSec





B.
  

USER2SID



D.
  

SID2USER



E.
  

DumpSec



When analyzing the IDS logs, the system administrator noticed an alert was logged when
the external router was accessed from the administrator’s Computer to update the router configuration. What type of an alert is this?


A.

False negative


B.

True negative


C.

True positive


D.

False positive





D.
  

False positive



Explanation:
True Positive - IDS referring a behavior as an attack, in real life it is
True Negative - IDS referring a behavior not an attack and in real life it is not
False Positive - IDS referring a behavior as an attack, in real life it is not
False Negative - IDS referring a behavior not an attack, but in real life is an attack.
False Negative - is the most serious and dangerous state of all !!!!

Under what conditions does a secondary name server request a zone transfer from a
primary name server?


A.

When a primary SOA is higher that a secondary SOA


B.

When a secondary SOA is higher that a primary SOA


C.

When a primary name server has had its service restarted


D.

When a secondary name server has had its service restarted


E.

When the TTL falls to zero





A.
  

When a primary SOA is higher that a secondary SOA



A large mobile telephony and data network operator has a data center that houses network
elements. These are essentially large computers running on Linux. The perimeter of the
data center is secured with firewalls and IPS systems. What is the best security policy concerning this setup?


A.

Network elements must be hardened with user ids and strong passwords. Regular
security tests and audits should be performed.


B.

As long as the physical access to the network elements is restricted, there is no need for
additional measures.


C.

There is no need for specific security measures on the network elements as long as
firewalls and IPS systems exist.


D.

The operator knows that attacks and down time are inevitable and should have a
backup site.





A.
  

Network elements must be hardened with user ids and strong passwords. Regular
security tests and audits should be performed.



An attacker with access to the inside network of a small company launches a successful
STP manipulation attack. What will he do next?


A.

He will create a SPAN entry on the spoofed root bridge and redirect traffic to his
computer.


B.

He will activate OSPF on the spoofed root bridge.


C.

He will repeat this action so that it escalates to a DoS attack.


D.

He will repeat the same attack against all L2 switches of the network.





A.
  

He will create a SPAN entry on the spoofed root bridge and redirect traffic to his
computer.




Page 8 out of 114 Pages
Previous