Go Back on 312-50v9 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-50v9 Practice Test


Page 4 out of 25 Pages

Which of the following is a command line packet analyzer similar to GUI-based Wireshark?


A.

Jack the ripper


B.

nessus


C.

tcpdump


D.

ethereal





C.
  

tcpdump



What is the most common method to exploit the “Bash Bug” or ShellShock” vulnerability?


A.

SSH


B.

SYN Flood


C.

Manipulate format strings in text fields


D.

Through Web servers utilizing CGI (CommonGateway Interface) to send a malformed
environment variable to a vulnerable Web server





D.
  

Through Web servers utilizing CGI (CommonGateway Interface) to send a malformed
environment variable to a vulnerable Web server



It is a vulnerability in GNU’s bash shell, discovered in September of 2004, that gives
attackers access to run remote commands on a vulnerable system. The malicious software
can take control of an infected machine, launch denial-of service attacks to disrupt
websites, and scan for other vulnerable devices (including routers).
Which of the following vulnerabilities is being described?


A.

Shellshock


B.

Rootshock


C.

Shellbash


D.

Rootshell





A.
  

Shellshock



During a security audit of IT processes, an IS auditor found that there was no documented
security procedures. What should the IS auditor do?


A.

Terminate the audit.


B.

Identify and evaluate existing practices.


C.

Create a procedures document


D.

Conduct compliance testing





B.
  

Identify and evaluate existing practices.



An attacker has installed a RAT on a host. The attacker wants to ensure that when a user
attempts to go to www.MyPersonalBank.com, that the user is directed to a phishing site.
Which file does the attacker needto modify?


A.

Hosts


B.

Networks


C.

Boot.ini


D.

Sudoers





A.
  

Hosts




Page 4 out of 25 Pages
Previous