Discount Offer
Go Back on 312-50v9 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

312-50v9 Practice Test

Whether you're a beginner or brushing up on skills, our 312-50v9 practice exam is your key to success. Our comprehensive question bank covers all key topics, ensuring you’re fully prepared.


Page 3 out of 25 Pages

An Intrusion Detection System(IDS) has alerted the network administrator to a possibly
malicious sequence of packets went to a Web server in the network’s external DMZ. The
packet traffic was captured by the IDS and saved to a PCAP file.
What type of network tool can be used to determine if these packets are genuinely
malicious or simply a false positive?


A.

Protocol analyzer


B.

Intrusion Prevention System (IPS)


C.

Vulnerability scanner


D.

Network sniffer





PGP, SSL, and IKE are all examples of which type of cryptography?


A.

Hash Algorithm


B.

Secret Key


C.

Public Key


D.

Digest





A company’s security states that all web browsers must automatically delete their HTTP
browser cookies upon terminating. What sort of security breach is this policy attempting to
mitigate?


A.

Attempts by attackers to determine the user's Web browser usage patterns, including
when sites were visited and for how long.


B.

Attempts by attackers to access passwords stored on the user's computer without the
user's knowledge.


C.

Attempts by attackers to access Web sites that trust the Web browser user by stealing
the user's authentication credentials.


D.

Attempts by attacks to access the user and password information stores in the
company's SQL database.





Ricardo wants to send secret messages to acompetitor company. To secure these
messages, he uses a technique of hiding a secret message within an ordinary message,
the technique provides 'security through obscurity'. What technique is Ricardo using?


A.

RSA algorithm


B.

Steganography


C.

Encryption


D.

Public-key cryptography





Which regulationdefines security and privacy controls for Federal information systems and
organizations?


A.

HIPAA


B.

EU Safe Harbor


C.

PCI-DSS


D.

NIST-800-53






Page 3 out of 25 Pages
Previous