Go Back on 312-50v13 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-50v13 Practice Test


Page 1 out of 6 Pages

In this form of encryption algorithm, every individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?


A. IDEA


B. Triple Data Encryption Standard


C. AES


D. MD5 encryption algorithm





B.
  Triple Data Encryption Standard

John is investigating web-application firewall logs and observers that someone is attempting to inject the following:

  • char buff[10];
  • buff[10] = 'a';
What type of attack is this?


A. SQL injection


B. Buffer overflow


C. CSRF


D. XSS





B.
  Buffer overflow

John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization. Which of the following attack techniques is used by John?


A. Insider threat


B. Diversion theft


C. Spear-phishing sites


D. Advanced persistent threat





D.
  Advanced persistent threat

You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?


A. nmap -A - Pn


B. nmap -sP -p-65535 -T5


C. nmap -sT -O -T0


D. nmap -A --host-timeout 99 -T1





C.
  nmap -sT -O -T0

This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as GCMP-256, HMAC-SHA384, and ECDSA using a 384-bit elliptic curve. Which is this wireless security protocol?


A. WPA3-Personal


B. WPA3-Enterprise


C. WPA2-Enterprise


D. WPA2-Personal





B.
  WPA3-Enterprise


Page 1 out of 6 Pages