Go Back on 312-50v9 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-50v9 Practice Test


Page 9 out of 25 Pages

Which of the following is a design pattern based on distinct pieces ofsoftware providing
application functionality as services to other applications?


A.

Lean Coding


B.

Service Oriented Architecture


C.

Object Oriented Architecture


D.

Agile Process





B.
  

Service Oriented Architecture



Which of the following tools can be used for passiveOS fingerprinting?


A.

tcpdump


B.

ping


C.

nmap


D.

Tracert





C.
  

nmap



When you are getting informationabout a web server, it is very important to know the HTTP
Methods (GET, POST, HEAD, PUT, DELETE, TRACE) that are available because there
are two critical methods (PUT and DELETE). PUT can upload a file to the server and
DELETE can delete a file from the server. You can detect all these methods (GET, POST,
HEAD, PUT, DELETE, TRACE) using NMAP script engine.
What nmap script will help you with this task?


A.

http enum


B.

http-git


C.

http-headers


D.

http-methods





B.
  

http-git



Which of the following statements regarding ethical hacking is incorrect?


A.

Testing should be remotely performed offsite.


B.

Ethical hackers should never use tools that have potential of exploiting vulnerabilities in
the organizations IT system.


C.

Ethical hacking should not involve writing to or modifying the target systems.


D.

An organization should use ethical hackers who do not sell hardware/software or other consulting services.





B.
  

Ethical hackers should never use tools that have potential of exploiting vulnerabilities in
the organizations IT system.



To maintain compliance with regulatory requirements, a security audit of the systems on a
network must be performed to determine their compliance with security policies. Which one
of the following tools would most likely be used in such as audit?


A.

Port scanner


B.

Protocol analyzer


C.

Vulnerability scanner


D.

Intrusion Detection System





C.
  

Vulnerability scanner




Page 9 out of 25 Pages
Previous