Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?
Exam 312-50 - admin post to:2017-07-05 read more

In order to show improvement of security over time, what must be developed?
Exam 312-50 - admin post to:2017-07-05 read more

Passive reconnaissance involves collecting information through which of the following?
Exam 312-50 - admin post to:2017-07-05 read more

How can rainbow tables be defeated?
Exam 312-50 - admin post to:2017-07-05 read more

The following is a sample of output from a penetration testers machine targeting a machine with the IP address of 192.168.1.106:
Exam 312-50 - admin post to:2017-07-05 read more

An NMAP scan of a server shows port 25 is open. What risk could this pose?
Exam 312-50 - admin post to:2017-07-05 read more

A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing in concluding the Operating System (OS) version installed. Considering the NMAP result below, which of the following is likely to be installed on the target machine by the OS?
Starting NMAP 5.21 at 2011-03-15 11:06 NMAP scan report for 172.16.40.65 Host is up (1.00s latency). Not shown: 993 closed ports PORT STATE SERVICE 21/tcp open ftp 23/tcp open telnet 80/tcp open http 139/tcp open netbios-ssn 515/tcp open 631/tcp open ipp 9100/tcp open MAC Address: 00:00:48:0D:EE:89
Exam 312-50 - admin post to:2017-07-05 read more

What type of OS fingerprinting technique sends specially crafted packets to the remote OS and analyzes the received response?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following lists are valid data-gathering activities associated with a risk assessment?
Exam 312-50 - admin post to:2017-07-05 read more

Which system consists of a publicly available set of databases that contain domain name registration contact information?
Exam 312-50 - admin post to:2017-07-05 read more

A penetration tester was hired to perform a penetration test for a bank. The tester began searching for IP ranges owned by the bank, performing lookups on the banks DNS servers, reading news articles online about the bank, watching what times the bank employees come into work and leave from work, searching the banks job postings (paying special attention to IT related jobs), and visiting the local dumpster for the banks corporate office. What phase of the penetration test is the tester currently in?
Exam 312-50 - admin post to:2017-07-05 read more

The following is part of a log file taken from the machine on the network with the IP address of 192.168.1.106:
Time:Mar 13 17:30:15 Port:20 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP
Time:Mar 13 17:30:17 Port:21 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP
Time:Mar 13 17:30:19 Port:22 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP
Time:Mar 13 17:30:21 Port:23 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP
Time:Mar 13 17:30:22 Port:25 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP
Time:Mar 13 17:30:23 Port:80 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP
Time:Mar 13 17:30:30 Port:443 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP
What type of activity has been logged?
Exam 312-50 - admin post to:2017-07-05 read more

A Security Engineer at a medium-sized accounting firm has been tasked with discovering how much information can be obtained from the firms public facing web servers. The engineer decides to start by using netcat to port 80.
The engineer receives this output:
HTTP/1.1 200 OK
Server: Microsoft-IIS/6
Expires: Tue, 17 Jan 2011 01:41:33 GMT
Date: Mon, 16 Jan 2011 01:41:33 GMT
Content-Type: text/html
Accept-Ranges: bytes
Last-Modified: Wed, 28 Dec 2010 15:32:21 GMT
ETag: "b0aac0542e25c31:89d"
Content-Length: 7369
Which of the following is an example of what the engineer performed?
Exam 312-50 - admin post to:2017-07-05 read more

An NMAP scan of a server shows port 69 is open. What risk could this pose?
Exam 312-50 - admin post to:2017-07-05 read more

What information should an IT system analysis provide to the risk assessor?
Exam 312-50 - admin post to:2017-07-05 read more

Which results will be returned with the following Google search query?
site:target.com -site:Marketing.target.com accounting
Exam 312-50 - admin post to:2017-07-05 read more

A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is a preventive control?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is considered an acceptable option when managing a risk?
Exam 312-50 - admin post to:2017-07-05 read more

Which security control role does encryption meet?
Exam 312-50 - admin post to:2017-07-05 read more

A covert channel is a channel that
Exam 312-50 - admin post to:2017-07-05 read more

John the Ripper is a technical assessment tool used to test the weakness of which of the following?
Exam 312-50 - admin post to:2017-07-05 read more

Least privilege is a security concept that requires that a user is
Exam 312-50 - admin post to:2017-07-05 read more

If the final set of security controls does not eliminate all risk in a system, what could be done next?
Exam 312-50 - admin post to:2017-07-05 read more

What is one thing a tester can do to ensure that the software is trusted and is not changing or tampering with critical data on the back end of a system it is loaded on?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following examples best represents a logical or technical control?
Exam 312-50 - admin post to:2017-07-05 read more

Which type of access control is used on a router or firewall to limit network activity?
Exam 312-50 - admin post to:2017-07-05 read more

At a Windows Server command prompt, which command could be used to list the running services?
Exam 312-50 - admin post to:2017-07-05 read more

Windows file servers commonly hold sensitive files, databases, passwords and more. Which of the following choices would be a common vulnerability that usually exposes them?
Exam 312-50 - admin post to:2017-07-05 read more

While conducting a penetration test, the tester determines that there is a firewall between the testers machine and the target machine. The firewall is only monitoring TCP handshaking of packets at the session layer of the OSI model. Which type of firewall is the tester trying to traverse?
Exam 312-50 - admin post to:2017-07-05 read more

A company firewall engineer has configured a new DMZ to allow public systems to be located away from the internal network. The engineer has three security zones set:
Untrust (Internet) – (Remote network = 217.77.88.0/24) DMZ (DMZ) – (11.12.13.0/24) Trust (Intranet) – (192.168.0.0/24)
The engineer wants to configure remote desktop access from a fixed IP on the remote network to a remote desktop server in the DMZ. Which rule would best fit this requirement?
Exam 312-50 - admin post to:2017-07-05 read more

A circuit level gateway works at which of the following layers of the OSI Model?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is a symmetric cryptographic standard?
Exam 312-50 - admin post to:2017-07-05 read more

A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted.
Which cryptography attack is the student attempting?
Exam 312-50 - admin post to:2017-07-05 read more

Which property ensures that a hash function will not produce the same hashed value for two different messages?
Exam 312-50 - admin post to:2017-07-05 read more

How can telnet be used to fingerprint a web server?
Exam 312-50 - admin post to:2017-07-05 read more

Low humidity in a data center can cause which of the following problems?
Exam 312-50 - admin post to:2017-07-05 read more

A consultant is hired to do physical penetration testing at a large financial company. In the first day of his assessment, the consultant goes to the companys building dressed like an electrician and waits in the lobby for an employee to pass through the main access gate, then the consultant follows the employee behind to get into the restricted area. Which type of attack did the consultant perform?
Exam 312-50 - admin post to:2017-07-05 read more

When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrators computer to update the router configuration. What type of an alert is this?
Exam 312-50 - admin post to:2017-07-05 read more

While performing data validation of web content, a security technician is required to restrict malicious input. Which of the following processes is an efficient way of restricting malicious input?
Exam 312-50 - admin post to:2017-07-05 read more

A security consultant decides to use multiple layers of anti-virus defense, such as end user desktop antivirus and E-mail gateway. This approach can be used to mitigate which kind of attack?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following resources does NMAP need to be used as a basic vulnerability scanner covering several vectors like SMB, HTTP and FTP?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following scanning tools is specifically designed to find potential exploits in Microsoft Windows products?
Exam 312-50 - admin post to:2017-07-05 read more

A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the IT department had a dial-out modem installed. Which security policy must the security analyst check to see if dial-out modems are allowed?
Exam 312-50 - admin post to:2017-07-05 read more

When creating a security program, which approach would be used if senior management is supporting and enforcing the security policy?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following processes evaluates the adherence of an organization to its stated security policy?
Exam 312-50 - admin post to:2017-07-05 read more

A security consultant is trying to bid on a large contract that involves penetration testing and reporting. The company accepting bids wants proof of work so the consultant prints out several audits that have been performed. Which of the following is likely to occur as a result?
Exam 312-50 - admin post to:2017-07-05 read more

Which type of scan is used on the eye to measure the layer of blood vessels?
Exam 312-50 - admin post to:2017-07-05 read more

What is the main reason the use of a stored biometric is vulnerable to an attack?
Exam 312-50 - admin post to:2017-07-05 read more

During a wireless penetration test, a tester detects an access point using WPA2 encryption. Which of the following attacks should be used to obtain the key?
Exam 312-50 - admin post to:2017-07-05 read more

Which type of antenna is used in wireless communication?
Exam 312-50 - admin post to:2017-07-05 read more

What is the name of the international standard that establishes a baseline level of confidence in the security functionality of IT products by providing a set of requirements for evaluation?
Exam 312-50 - admin post to:2017-07-05 read more

One way to defeat a multi-level security solution is to leak data via
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following conditions must be given to allow a tester to exploit a Cross-Site Request Forgery (CSRF) vulnerable web application?
Exam 312-50 - admin post to:2017-07-05 read more

What is the main difference between a “Normal” SQL Injection and a “Blind” SQL Injection vulnerability?
Exam 312-50 - admin post to:2017-07-05 read more

During a penetration test, a tester finds a target that is running MS SQL 2000 with default credentials. The tester assumes that the service is running with Local System account. How can this weakness be exploited to access the system?
Exam 312-50 - admin post to:2017-07-05 read more

The precaution of prohibiting employees from bringing personal computing devices into a facility is what type of security control?
Exam 312-50 - admin post to:2017-07-05 read more

A pentester gains access to a Windows application server and needs to determine the settings of the built-in Windows firewall. Which command would be used?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following types of firewall inspects only header information in network traffic?
Exam 312-50 - admin post to:2017-07-05 read more

During a penetration test, the tester conducts an ACK scan using NMAP against the external interface of the DMZ firewall. NMAP reports that port 80 is unfiltered. Based on this response, which type of packet inspection is the firewall conducting?
Exam 312-50 - admin post to:2017-07-05 read more

Firewalk has just completed the second phase (the scanning phase) and a technician receives the output shown below. What conclusions can be drawn based on these scan results?
TCP port 21 – no response TCP port 22 – no response TCP port 23 – Time-to-live exceeded
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is an example of an asymmetric encryption implementation?
Exam 312-50 - admin post to:2017-07-05 read more

A hacker was able to sniff packets on a companys wireless network. The following information was discovered:
The Key 10110010 01001011 The Cyphertext 01100101 01011010
Using the Exlcusive OR, what was the original message?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following cryptography attack methods is usually performed without the use of a computer?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is a strong post designed to stop a car?
Exam 312-50 - admin post to:2017-07-05 read more

A Network Administrator was recently promoted to Chief Security Officer at a local university. One of employees new responsibilities is to manage the implementation of an RFID card access system to a new server room on campus. The server room will house student enrollment information that is securely backed up to an off-site location.
During a meeting with an outside consultant, the Chief Security Officer explains that he is concerned that the existing security controls have not been designed properly. Currently, the Network Administrator is responsible for approving and issuing RFID card access to the server room, as well as reviewing the electronic access logs on a weekly basis.
Which of the following is an issue with the situation?
Exam 312-50 - admin post to:2017-07-05 read more

What is the most secure way to mitigate the theft of corporate information from a laptop that was left in a hotel room?
Exam 312-50 - admin post to:2017-07-05 read more

In the software security development life cycle process, threat modeling occurs in which phase?
Exam 312-50 - admin post to:2017-07-05 read more

A network administrator received an administrative alert at 3:00 a.m. from the intrusion detection system. The alert was generated because a large number of packets were coming into the network over ports 20 and 21. During analysis, there were no signs of attack on the FTP servers. How should the administrator classify this situation?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following techniques does a vulnerability scanner use in order to detect a vulnerability on a target service?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following business challenges could be solved by using a vulnerability scanner?
Exam 312-50 - admin post to:2017-07-05 read more

A security policy will be more accepted by employees if it is consistent and has the support of
Exam 312-50 - admin post to:2017-07-05 read more

A company has hired a security administrator to maintain and administer Linux and Windows-based systems. Written in the nightly report file is the following: Firewall log files are at the expected value of 4 MB. The current time is 12am. Exactly two hours later the size has decreased considerably. Another hour goes by and the log files have shrunk in size again. Which of the following actions should the security administrator take?
Exam 312-50 - admin post to:2017-07-05 read more

Which type of scan measures a persons external features through a digital video camera?
Exam 312-50 - admin post to:2017-07-05 read more

WPA2 uses AES for wireless data encryption at which of the following encryption levels?
Exam 312-50 - admin post to:2017-07-05 read more

An attacker uses a communication channel within an operating system that is neither designed nor intended to transfer information. What is the name of the communications channel?
Exam 312-50 - admin post to:2017-07-05 read more

What technique is used to perform a Connection Stream Parameter Pollution (CSPP) attack?
Exam 312-50 - admin post to:2017-07-05 read more

A newly discovered flaw in a software application would be considered which kind of security vulnerability?
Exam 312-50 - admin post to:2017-07-05 read more

During a penetration test, a tester finds that the web application being analyzed is vulnerable to Cross Site Scripting (XSS). Which of the following conditions must be met to exploit this vulnerability?
Exam 312-50 - admin post to:2017-07-05 read more

The use of alert thresholding in an IDS can reduce the volume of repeated alerts, but introduces which of the following vulnerabilities?
Exam 312-50 - admin post to:2017-07-05 read more

What is the main advantage that a network-based IDS/IPS system has over a host-based solution?
Exam 312-50 - admin post to:2017-07-05 read more

The network administrator for a company is setting up a website with e-commerce capabilities. Packet sniffing is a concern because credit card information will be sent electronically over the Internet. Customers visiting the site will need to encrypt the data with HTTPS. Which type of certificate is used to encrypt and decrypt the data?
Exam 312-50 - admin post to:2017-07-05 read more

When an alert rule is matched in a network-based IDS like snort, the IDS does which of the following?
Exam 312-50 - admin post to:2017-07-05 read more

Which type of intrusion detection system can monitor and alert on attacks, but cannot stop them?
Exam 312-50 - admin post to:2017-07-05 read more

An organization hires a tester to do a wireless penetration test. Previous reports indicate that the last test did not contain management or control packets in the submitted traces. Which of the following is the most likely reason for lack of management or control packets?
Exam 312-50 - admin post to:2017-07-05 read more

From the two screenshots below, which of the following is occurring?
Exam 312-50 - admin post to:2017-07-05 read more

Pentest results indicate that voice over IP traffic is traversing a network. Which of the following tools will decode a packet capture and extract the voice conversations?
Exam 312-50 - admin post to:2017-07-05 read more

Which technical characteristic do Ethereal/Wireshark, TCPDump, and Snort have in common?
Exam 312-50 - admin post to:2017-07-05 read more

Which set of access control solutions implements two-factor authentication?
Exam 312-50 - admin post to:2017-07-05 read more

A security engineer has been asked to deploy a secure remote access solution that will allow employees to connect to the companys internal network. Which of the following can be implemented to minimize the opportunity for the man-in-the-middle attack to occur?
Exam 312-50 - admin post to:2017-07-05 read more

A person approaches a network administrator and wants advice on how to send encrypted email from home. The end user does not want to have to pay for any license fees or manage server services. Which of the following is the most secure encryption protocol that the network administrator should recommend?
Exam 312-50 - admin post to:2017-07-05 read more

To send a PGP encrypted message, which piece of information from the recipient must the sender have before encrypting the message?
Exam 312-50 - admin post to:2017-07-05 read more

An engineer is learning to write exploits in C++ and is using the exploit tool Backtrack. The engineer wants to compile the newest C++ exploit and name it calc.exe. Which command would the engineer use to accomplish this?
Exam 312-50 - admin post to:2017-07-05 read more

On a Linux device, which of the following commands will start the Nessus client in the background so that the Nessus server can be configured?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following tools will scan a network to perform vulnerability checks and compliance auditing?
Exam 312-50 - admin post to:2017-07-05 read more

What is the best defense against privilege escalation vulnerability?
Exam 312-50 - admin post to:2017-07-05 read more

How can a rootkit bypass Windows 7 operating systems kernel mode, code signing policy?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following items of a computer system will an anti-virus program scan for viruses?
Exam 312-50 - admin post to:2017-07-05 read more

Which protocol and port number might be needed in order to send log messages to a log analysis tool that resides behind a firewall?
Exam 312-50 - admin post to:2017-07-05 read more

A pentester is using Metasploit to exploit an FTP server and pivot to a LAN. How will the pentester pivot using Metasploit?
Exam 312-50 - admin post to:2017-07-05 read more

What is the outcome of the comm”nc -l -p 2222 | nc 10.1.0.43 1234"?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is a client-server tool utilized to evade firewall inspection?
Exam 312-50 - admin post to:2017-07-05 read more

Which tool is used to automate SQL injections and exploit a database by forcing a given web application to connect to another database controlled by a hacker?
Exam 312-50 - admin post to:2017-07-05 read more

A tester has been hired to do a web application security test. The tester notices that the site is dynamic and must make use of a back end database. In order for the tester to see if SQL injection is possible, what is the first character that the tester should use to attempt breaking a valid SQL request?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following identifies the three modes in which Snort can be configured to run?
Exam 312-50 - admin post to:2017-07-05 read more

When using Wireshark to acquire packet capture on a network, which device would enable the capture of all traffic on the wire?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following programming languages is most vulnerable to buffer overflow attacks?
Exam 312-50 - admin post to:2017-07-05 read more

Smart cards use which protocol to transfer the certificate in a secure manner?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is a hashing algorithm?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following problems can be solved by using Wireshark?
Exam 312-50 - admin post to:2017-07-05 read more

What is the correct PCAP filter to capture all TCP traffic going to or from host 192.168.0.125 on port 25?
Exam 312-50 - admin post to:2017-07-05 read more

Which tool would be used to collect wireless packet data?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is an example of two factor authentication?
Exam 312-50 - admin post to:2017-07-05 read more

Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process. Which of the following is the correct bit size of the Diffie-Hellman (DH) group 5?
Exam 312-50 - admin post to:2017-07-05 read more

After gaining access to the password hashes used to protect access to a web based application, knowledge of which cryptographic algorithms would be useful to gain access to the application?
Exam 312-50 - admin post to:2017-07-05 read more

What statement is true regarding LM hashes?
Exam 312-50 - admin post to:2017-07-05 read more

A developer for a company is tasked with creating a program that will allow customers to update their billing and shipping information. The billing address field used is limited to 50 characters. What pseudo code would the developer use to avoid a buffer overflow attack on the billing address field?
Exam 312-50 - admin post to:2017-07-05 read more

A security analyst in an insurance company is assigned to test a new web application that will be used by clients to help them choose and apply for an insurance plan. The analyst discovers that the application is developed in ASP scripting language and it uses MSSQL as a database backend. The analyst locates the applications search form and introduces the following code in the search input field:
"
When the analyst submits the form, the browser returns a pop-up window that says "Vulnerable". Which web applications vulnerability did the analyst discover?
Exam 312-50 - admin post to:2017-07-05 read more

A security administrator notices that the log file of the company’s webserver contains suspicious entries: Based on source code analysis, the analyst concludes that the login.php script is vulnerable to
Exam 312-50 - admin post to:2017-07-05 read more

Which solution can be used to emulate computer services, such as mail and ftp, and to capture information related to logins or actions?
Exam 312-50 - admin post to:2017-07-05 read more

Which command lets a tester enumerate alive systems in a class C network via ICMP using native Windows tools?
Exam 312-50 - admin post to:2017-07-05 read more

What results will the following command yield: NMAP -sS -O -p 123-153 192.168.100.3?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following parameters enables NMAPs operating system detection feature?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following open source tools would be the best choice to scan a network for potential targets?
Exam 312-50 - admin post to:2017-07-05 read more

A hacker is attempting to see which IP addresses are currently active on a network. Which NMAP switch would the hacker use?
Exam 312-50 - admin post to:2017-07-05 read more

A hacker, who posed as a heating and air conditioning specialist, was able to install a sniffer program in a switched environment network. Which attack could the hacker use to sniff all of the packets in the network?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following settings enables Nessus to detect when it is sending too many packets and the network pipe is approaching capacity?
Exam 312-50 - admin post to:2017-07-05 read more

How does an operating system protect the passwords used for account logins?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?
Exam 312-50 - admin post to:2017-07-05 read more

An attacker has been successfully modifying the purchase price of items purchased on the companys web site. The security administrators verify the web server and Oracle database have not been compromised directly. They have also verified the Intrusion Detection System (IDS) logs and found no attacks that could have caused this. What is the mostly likely way the attacker has been able to modify the purchase price?
Exam 312-50 - admin post to:2017-07-05 read more

Which tool can be used to silently copy files from USB devices?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is used to indicate a single-line comment in structured query language (SQL)?
Exam 312-50 - admin post to:2017-07-05 read more

A security engineer is attempting to map a companys internal network. The engineer enters in the following NMAP command:
NMAP –n –sS –P0 –p 80 ***.***.**.**
What type of scan is this?
Exam 312-50 - admin post to:2017-07-05 read more

What is the broadcast address for the subnet 190.86.168.0/22?
Exam 312-50 - admin post to:2017-07-05 read more

A company is using Windows Server 2003 for its Active Directory (AD). What is the most efficient way to crack the passwords for the AD users?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following does proper basic configuration of snort as a network intrusion detection system require?
Exam 312-50 - admin post to:2017-07-05 read more

How is sniffing broadly categorized?
Exam 312-50 - admin post to:2017-07-05 read more

What are the three types of authentication?
Exam 312-50 - admin post to:2017-07-05 read more

The use of technologies like IPSec can help guarantee the following: authenticity, integrity, confidentiality and
Exam 312-50 - admin post to:2017-07-05 read more

What is the main disadvantage of the scripting languages as opposed to compiled programming languages?
Exam 312-50 - admin post to:2017-07-05 read more

A botnet can be managed through which of the following?
Exam 312-50 - admin post to:2017-07-05 read more

Fingerprinting VPN firewalls is possible with which of the following tools?
Exam 312-50 - admin post to:2017-07-05 read more

What is a successful method for protecting a router from potential smurf attacks?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is optimized for confidential communications, such as bidirectional voice and video?
Exam 312-50 - admin post to:2017-07-05 read more

Advanced encryption standard is an algorithm used for which of the following?
Exam 312-50 - admin post to:2017-07-05 read more

The fundamental difference between symmetric and asymmetric key cryptographic systems is that symmetric key cryptography uses which of the following?
Exam 312-50 - admin post to:2017-07-05 read more

An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. The attacker can now use which cryptanalytic technique to attempt to discover the encryption key?
Exam 312-50 - admin post to:2017-07-05 read more

What is the primary drawback to using advanced encryption standard (AES) algorithm with a 256 bit key to share sensitive data?
Exam 312-50 - admin post to:2017-07-05 read more

A Certificate Authority (CA) generates a key pair that will be used for encryption and decryption of email. The integrity of the encrypted email is dependent on the security of which of the following?
Exam 312-50 - admin post to:2017-07-05 read more

When setting up a wireless network, an administrator enters a pre-shared key for security. Which of the following is true?
Exam 312-50 - admin post to:2017-07-05 read more

An attacker has captured a target file that is encrypted with public key cryptography. Which of the attacks below is likely to be used to crack the target file?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following processes of PKI (Public Key Infrastructure) ensures that a trust relationship exists and that a certificate is still valid for specific operations?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following describes a component of Public Key Infrastructure (PKI) where a copy of a private key is stored to provide third-party access and to facilitate recovery operations?
Exam 312-50 - admin post to:2017-07-05 read more

To reduce the attack surface of a system, administrators should perform which of the following processes to remove unnecessary software, services, and insecure configuration settings?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is a common Service Oriented Architecture (SOA) vulnerability?
Exam 312-50 - admin post to:2017-07-05 read more

The intrusion detection system at a software development company suddenly generates multiple alerts regarding attacks against the companys external webserver, VPN concentrator, and DNS servers. What should the security team do to determine which alerts to check first?
Exam 312-50 - admin post to:2017-07-05 read more

An IT security engineer notices that the companys web server is currently being hacked. What should the engineer do next?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is a primary service of the U.S. Computer Security Incident Response Team (CSIRT)?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following items is unique to the N-tier architecture method of designing software applications?
Exam 312-50 - admin post to:2017-07-05 read more

If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which other option could the tester use to get a response from a host using TCP?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following descriptions is true about a static NAT?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following network attacks takes advantage of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?
Exam 312-50 - admin post to:2017-07-05 read more

Employees in a company are no longer able to access Internet web sites on their computers. The network administrator is able to successfully ping IP address of web servers on the Internet and is able to open web sites by using an IP address in place of the URL. The administrator runs the nslookup command for www.eccouncil.org and receives an error message stating there is no response from the server. What should the administrator do next?
Exam 312-50 - admin post to:2017-07-05 read more

While testing the companys web applications, a tester attempts to insert the following test script into the search area on the companys web site:

Afterwards, when the tester presses the search button, a pop-up box appears on the screen with the text: "Testing Testing Testing". Which vulnerability has been detected in the web application?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is an advantage of utilizing security testing methodologies to conduct a security audit?
Exam 312-50 - admin post to:2017-07-05 read more

The Open Web Application Security Project (OWASP) testing methodology addresses the need to secure web applications by providing which one of the following services?
Exam 312-50 - admin post to:2017-07-05 read more

In the OSI model, where does PPTP encryption take place?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is an example of IP spoofing?
Exam 312-50 - admin post to:2017-07-05 read more

For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with which key?
Exam 312-50 - admin post to:2017-07-05 read more

Some passwords are stored using specialized encryption algorithms known as hashes. Why is this an appropriate method?
Exam 312-50 - admin post to:2017-07-05 read more

Company A and Company B have just merged and each has its own Public Key Infrastructure (PKI). What must the Certificate Authorities (CAs) establish so that the private PKIs for Company A and Company B trust one another and each private PKI can validate digital certificates from the other company?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following defines the role of a root Certificate Authority (CA) in a Public Key Infrastructure (PKI)?
Exam 312-50 - admin post to:2017-07-05 read more

A network security administrator is worried about potential man-in-the-middle attacks when users access a corporate web site from their workstations. Which of the following is the best remediation against this type of attack?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following levels of algorithms does Public Key Infrastructure (PKI) use?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is a characteristic of Public Key Infrastructure (PKI)?
Exam 312-50 - admin post to:2017-07-05 read more

Which security strategy requires using several, varying methods to protect IT systems against attacks?
Exam 312-50 - admin post to:2017-07-05 read more

SOAP services use which technology to format information?
Exam 312-50 - admin post to:2017-07-05 read more

Which statement best describes a server type under an N-tier architecture?
Exam 312-50 - admin post to:2017-07-05 read more

If an e-commerce site was put into a live environment and the programmers failed to remove the secret entry point that was used during the application development,what is this secret entry point known as?
Exam 312-50 - admin post to:2017-07-05 read more

A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0/24.
Which of the following has occurred?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following network attacks relies on sending an abnormally large packet size that exceeds TCP/IP specifications?
Exam 312-50 - admin post to:2017-07-05 read more

Which NMAP feature can a tester implement or adjust while scanning for open ports to avoid detection by the networks IDS?
Exam 312-50 - admin post to:2017-07-05 read more

When comparing the testing methodologies of Open Web Application Security Project (OWASP) and Open Source Security Testing Methodology Manual (OSSTMM) the main difference is
Exam 312-50 - admin post to:2017-07-05 read more

Which Open Web Application Security Project (OWASP) implements a web application full of known vulnerabilities?
Exam 312-50 - admin post to:2017-07-05 read more

What are the three types of compliance that the Open Source Security Testing Methodology Manual (OSSTMM) recognizes?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following algorithms provides better protection against brute force attacks by using a 160-bit message digest?
Exam 312-50 - admin post to:2017-07-05 read more

Which cipher encrypts the plain text digit (bit or byte) one by one?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following can take an arbitrary length of input and produce a message digest output of 160 bit?
Exam 312-50 - admin post to:2017-07-05 read more

Which element of Public Key Infrastructure (PKI) verifies the applicant?
Exam 312-50 - admin post to:2017-07-05 read more

Which vital role does the U.S. Computer Security Incident Response Team (CSIRT) provide?
Exam 312-50 - admin post to:2017-07-05 read more

How do employers protect assets with security policies pertaining to employee surveillance activities?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following ensures that updates to policies, procedures, and configurations are made in a controlled and documented fashion?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following tools would be the best choice for achieving compliance with PCI Requirement 11?
Exam 312-50 - admin post to:2017-07-05 read more

When does the Payment Card Industry Data Security Standard (PCI-DSS) require organizations to perform external and internal penetration testing?
Exam 312-50 - admin post to:2017-07-05 read more

Which United States legislation mandates that the Chief Executive Officer (CEO) and the Chief Financial Officer (CFO) must sign statements verifying the completeness and accuracy of financial reports?
Exam 312-50 - admin post to:2017-07-05 read more

How can a policy help improve an employees security awareness?
Exam 312-50 - admin post to:2017-07-05 read more

Which method can provide a better return on IT security investment and provide a thorough and comprehensive assessment of organizational security covering policy, procedure design, and implementation?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following guidelines or standards is associated with the credit card industry?
Exam 312-50 - admin post to:2017-07-05 read more

International Organization for Standardization (ISO) standard 27002 provides guidance for compliance by outlining
Exam 312-50 - admin post to:2017-07-05 read more

Which type of security document is written with specific step-by-step details?
Exam 312-50 - admin post to:2017-07-05 read more

An ethical hacker for a large security research firm performs penetration tests,vulnerability tests, and risk assessments. A friend recently started a company and asks the hacker to perform a penetration test and vulnerability assessment of the new company as a favor. What should the hackers next step be before starting work on this job?
Exam 312-50 - admin post to:2017-07-05 read more

A certified ethical hacker (CEH) completed a penetration test of the main headquarters of a company almost two months ago, but has yet to get paid. The customer is suffering from financial problems, and the CEH is worried that the company will go out of business and end up not paying. What actions should the CEH take?
Exam 312-50 - admin post to:2017-07-05 read more

Which initial procedure should an ethical hacker perform after being brought into an organization?
Exam 312-50 - admin post to:2017-07-05 read more

A consultant has been hired by the V.P. of a large financial organization to assess the companys security posture. During the security testing, the consultant comes across child pornography on the V.P.s computer. What is the consultants obligation to the financial organization?
Exam 312-50 - admin post to:2017-07-05 read more

A computer technician is using a new version of a word processing software package when it is discovered that a special sequence of characters causes the entire computer to crash.The technician researches the bug and discovers that no one else experienced the problem.What is the appropriate next step?
Exam 312-50 - admin post to:2017-07-05 read more

A certified ethical hacker (CEH) is approached by a friend who believes her husband is cheating. She offers to pay to break into her husbands email account in order to find proof so she can take him to court. What is the ethical response?
Exam 312-50 - admin post to:2017-07-05 read more

It is an entity or event with the potential to adversely impact a system through unauthorized access, destruction, disclosure, denial of service or modification of data.Which of the following terms best matches the definition?
Exam 312-50 - admin post to:2017-07-05 read more

As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing.
What document describes the specifics of the testing, the associated violations, and essentially protects both the organizations interest and your liabilities as a tester?
Exam 312-50 - admin post to:2017-07-05 read more

Initiating an attack against targeted businesses and organizations, threat actors compromise a carefully selected website by inserting an exploit resulting in malware infection. The attackers run exploits on well-known and trusted sites likely to be visited by their targeted victims. Aside from carefully choosing sites to compromise, these attacks are known to incorporate zero-day exploits that target unpatched vulnerabilities.Thus, the targeted entities are left with little or no defense against these exploits.
What type of attack is outlined in the scenario?
Exam 312-50 - admin post to:2017-07-05 read more

You have successfully gained access to your clients internal network and successfully comprised a Linux server which is part of the internal IP network. You want to know which Microsoft Windows workstations have file sharing enabled.
Which port would you see listening on these Windows machines in the network?
Exam 312-50 - admin post to:2017-07-05 read more

It is a short-range wireless communication technology intended to replace the cables connecting portable of fixed devices while maintaining high levels of security. It allows mobile phones, computers and other devices to connect and communicate using a short-range wireless connection.
Which of the following terms best matches the definition?
Exam 312-50 - admin post to:2017-07-05 read more

A hacker has successfully infected an internet-facing server which he will then use to send junk mail, take part in coordinated attacks, or host junk email content.
Which sort of trojan infects this server?
Exam 312-50 - admin post to:2017-07-05 read more

You have compromised a server and successfully gained a root access. You want to pivot and pass traffic undetected over the network and evade any possible Intrusion Detection System.
What is the best approach?
Exam 312-50 - admin post to:2017-07-05 read more

It is a kind of malware (malicious software) that criminals install on your computer so they can lock it from a remote location. This malware generates a pop-up window, webpage,or email warning from what looks like an official authority. It explains that your computer has been locked because of possible illegal activities on it and demands payment before you can access your files and programs again.
Which of the following terms best matches the definition?
Exam 312-50 - admin post to:2017-07-05 read more

You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly.
What is the best nmap command you will use?
Exam 312-50 - admin post to:2017-07-05 read more

You have compromised a server on a network and successfully opened a shell. You aimed to identify all operating systems running on the network. However, as you attempt to fingerprint all machines in the network using the nmap syntax below, it is not going through.
invictus@victim_server:~$ nmap -T4 -O 10.10.0.0/24 TCP/IP fingerprinting (for OS scan)
xxxxxxx xxxxxx xxxxxxxxx. QUITTING! What seems to be wrong?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following statements is TRUE?
Exam 312-50 - admin post to:2017-07-05 read more

You are logged in as a local admin on a Windows 7 system and you need to launch the Computer Management Console from command line.
Which command would you use?
Exam 312-50 - admin post to:2017-07-05 read more

What is the best description of SQL Injection?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is the BEST way to defend against network sniffing?
Exam 312-50 - admin post to:2017-07-05 read more

You have successfully gained access to a linux server and would like to ensure that the succeeding outgoing traffic from this server will not be caught by a Network Based Intrusion Detection Systems (NIDS).
What is the best way to evade the NIDS?
Exam 312-50 - admin post to:2017-07-05 read more

You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration?
alert tcp any any -> 192.168.100.0/24 21 (msg: "FTP on the network!";)
Exam 312-50 - admin post to:2017-07-05 read more

What is the benefit of performing an unannounced Penetration Testing?
Exam 312-50 - admin post to:2017-07-05 read more

You have successfully compromised a machine on the network and found a server that is alive on the same network. You tried to ping it but you didnt get any response back.
What is happening?
Exam 312-50 - admin post to:2017-07-05 read more

Under the "Post-attack Phase and Activities", it is the responsibility of the tester to restore the systems to a pre-test state.
Which of the following activities should not be included in this phase? (see exhibit)
Exhibit:
Exam 312-50 - admin post to:2017-07-05 read more

It is a regulation that has a set of guidelines, which should be adhered to by anyone who handles any electronic medical data. These guidelines stipulate that all medical practices must ensure that all necessary measures are in place while saving, accessing, and sharing any electronic medical data to keep patient data secure.
Which of the following regulations best matches the description?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is a component of a risk assessment?
Exam 312-50 - admin post to:2017-07-05 read more

A medium-sized healthcare IT business decides to implement a risk management strategy.
Which of the following is NOT one of the five basic responses to risk?
Exam 312-50 - admin post to:2017-07-05 read more

Your company was hired by a small healthcare provider to perform a technical assessment on the network.
What is the best approach for discovering vulnerabilities on a Windows-based computer?
Exam 312-50 - admin post to:2017-07-05 read more

Nation-state threat actors often discover vulnerabilities and hold on to them until they want to launch a sophisticated attack. The Stuxnet attack was an unprecedented style of attack because it used four types of vulnerability.
What is this style of attack called?
Exam 312-50 - admin post to:2017-07-05 read more

An attacker changes the profile information of a particular user (victim) on the target website. The attacker uses this string to update the victims profile to a text file and then submit the data to the attackers database.

What is this type of attack (that can use either HTTP GET or HTTP POST) called?
Exam 312-50 - admin post to:2017-07-05 read more

It is a vulnerability in GNUs bash shell, discovered in September of 2014, that gives attackers access to run remote commands on a vulnerable system. The malicious software can take control of an infected machine, launch denial-of-service attacks to disrupt websites, and scan for other vulnerable devices (including routers).
Which of the following vulnerabilities is being described?
Exam 312-50 - admin post to:2017-07-05 read more

When you return to your desk after a lunch break, you notice a strange email in your inbox. The sender is someone you did business with recently, but the subject line has strange characters in it.
What should you do?
Exam 312-50 - admin post to:2017-07-05 read more

The network administrator contacts you and tells you that she noticed the temperature on the internal wireless router increases by more than 20% during weekend hours when the office was closed. She asks you to investigate the issue because she is busy dealing with a big conference and she doesnt have time to perform the task.
What tool can you use to view the network traffic being sent and received by the wireless router?
Exam 312-50 - admin post to:2017-07-05 read more

A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server.
Based on this information, what should be one of your key recommendations to the bank?
Exam 312-50 - admin post to:2017-07-05 read more

Port scanning can be used as part of a technical assessment to determine network vulnerabilities. The TCP XMAS scan is used to identify listening ports on the targeted system.
If a scanned port is open, what happens?
Exam 312-50 - admin post to:2017-07-05 read more

During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a Demilitarized Zone (DMZ) and a second DNS server on the internal network.
What is this type of DNS configuration commonly called?
Exam 312-50 - admin post to:2017-07-05 read more

This tool is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools.
Which of the following tools is being described?
Exam 312-50 - admin post to:2017-07-05 read more

The Heartbleed bug was discovered in 2014 and is widely referred to under MITREs Common Vulnerabilities and Exposures (CVE) as CVE-2014-0160. This bug affects the OpenSSL implementation of the transport layer security (TLS) protocols defined in RFC6520.
What type of key does this bug leave exposed to the Internet making exploitation of any compromised system very easy?
Exam 312-50 - admin post to:2017-07-05 read more

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.
Which Algorithm is this referring to?
Exam 312-50 - admin post to:2017-07-05 read more

This international organization regulates billions of transactions daily and provides security guidelines to protect personally identifiable information (PII). These security controls provide a baseline and prevent low-level hackers sometimes known as script kiddies from causing a data breach.
Which of the following organizations is being described?
Exam 312-50 - admin post to:2017-07-05 read more

Your company performs penetration tests and security assessments for small and medium-sized business in the local area. During a routine security assessment, you discover information that suggests your client is involved with human trafficking.
What should you do?
Exam 312-50 - admin post to:2017-07-05 read more

Jesse receives an email with an attachment labeled “Court_Notice_21206.zip”. Inside the zip file is a file named “Court_Notice_21206.docx.exe” disguised as a word document. Upon execution, a window appears stating, “This word document is corrupt.” In the background, the file copies itself to Jesse APPDATAlocal directory and begins to beacon to a C2 server to download additional malicious binaries.
What type of malware has Jesse encountered?
Exam 312-50 - admin post to:2017-07-05 read more

Which tool allows analysts and pen testers to examine links between data using graphs and link analysis?
Exam 312-50 - admin post to:2017-07-05 read more

While using your banks online servicing you notice the following string in the URL bar: “http:// www.MyPersonalBank.com/account?
id=368940911028389&Damount=10980&Camount=21”
You observe that if you modify the Damount & Camount values and submit the request, that data on the web page reflect the changes.
Which type of vulnerability is present on this site?
Exam 312-50 - admin post to:2017-07-05 read more

Perspective clients want to see sample reports from previous penetration tests.
What should you do next?
Exam 312-50 - admin post to:2017-07-05 read more

During a blackbox pen test you attempt to pass IRC traffic over port 80/TCP from a compromised web enabled host. The traffic gets blocked; however, outbound HTTP traffic is unimpeded.
What type of firewall is inspecting outbound traffic?
Exam 312-50 - admin post to:2017-07-05 read more

Jimmy is standing outside a secure entrance to a facility. He is pretending to have a tense conversation on his cell phone as an authorized employee badges in. Jimmy, while still on the phone, grabs the door as it begins to close.
What just happened?
Exam 312-50 - admin post to:2017-07-05 read more

Youve gained physical access to a Windows 2008 R2 server which has an accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your tool kit you have an Ubuntu 9.10 Linux LiveCD. Which Linux based tool has the ability to change any users password or to activate disabled Windows accounts?
Exam 312-50 - admin post to:2017-07-05 read more

An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", that the user is directed to a phishing site.
Which file does the attacker need to modify?
Exam 312-50 - admin post to:2017-07-05 read more

After trying multiple exploits, youve gained root access to a Centos 6 server. To ensure you maintain access, what would you do first?
Exam 312-50 - admin post to:2017-07-05 read more

env x=(){ :;};echo exploit bash -c cat /etc/passwd
What is the Shellshock bash vulnerability attempting to do on an vulnerable Linux host?
Exam 312-50 - admin post to:2017-07-05 read more

Using Windows CMD, how would an attacker list all the shares to which the current user context has access?
Exam 312-50 - admin post to:2017-07-05 read more

A common cryptographical tool is the use of XOR. XOR the following binary values: 10110001 00111010
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is the successor of SSL?
Exam 312-50 - admin post to:2017-07-05 read more

You are attempting to man-in-the-middle a session. Which protocol will allow you to guess a sequence number?
Exam 312-50 - admin post to:2017-07-05 read more

Your team has won a contract to infiltrate an organization. The company wants to have the attack be as realistic as possible; therefore, they did not provide any information besides the company name.
What should be the first step in security testing the client?
Exam 312-50 - admin post to:2017-07-05 read more

Which regulation defines security and privacy controls for Federal information systems and organizations?
Exam 312-50 - admin post to:2017-07-05 read more

How does the Address Resolution Protocol (ARP) work?
Exam 312-50 - admin post to:2017-07-05 read more

You are performing information gathering for an important penetration test. You have found pdf, doc, and images in your objective. You decide to extract metadata from these files and analyze it.
What tool will help you with the task?
Exam 312-50 - admin post to:2017-07-05 read more

When you are collecting information to perform a data analysis, Google commands are very useful to find sensitive information and files. These files may contain information about passwords, system functions, or documentation.
What command will help you to search files using Google as a search engine?
Exam 312-50 - admin post to:2017-07-05 read more

What is a "Collision attack" in cryptography?
Exam 312-50 - admin post to:2017-07-05 read more

You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionists email, and you send her an email changing the source email to her bosss email( boss@company ). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with links. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links dont work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network.
What testing method did you use?
Exam 312-50 - admin post to:2017-07-05 read more

When you are getting information about a web server, it is very important to know the HTTP Methods (GET, POST, HEAD, PUT, DELETE, TRACE) that are available because there are two critical methods (PUT and DELETE). PUT can upload a file to the server and DELETE can delete a file from the server. You can detect all these methods (GET, POST, HEAD, PUT, DELETE, TRACE) using NMAP script engine.
What nmap script will help you with this task?
Exam 312-50 - admin post to:2017-07-05 read more

When you are testing a web application, it is very useful to employ a proxy tool to save every request and response. You can manually test every request and analyze the response to find vulnerabilities. You can test parameter and headers manually to get more precise results than if using web vulnerability scanners.
What proxy tool will help you find web vulnerabilities?
Exam 312-50 - admin post to:2017-07-05 read more

You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine.
What wireshark filter will show the connections from the snort machine to kiwi syslog machine?
Exam 312-50 - admin post to:2017-07-05 read more

This asymmetry cipher is based on factoring the product of two large prime numbers.
What cipher is described above?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following parameters describe LM Hash (see exhibit):
Exhibit:
Exam 312-50 - admin post to:2017-07-05 read more

What is the process of logging, recording, and resolving events that take place in an organization?
Exam 312-50 - admin post to:2017-07-05 read more

The Open Web Application Security Project (OWASP) is the worldwide not-for-profit charitable organization focused on improving the security of software. What item is the primary concern on OWASPs Top Ten Project Most Critical Web Application Security Risks?
Exam 312-50 - admin post to:2017-07-05 read more

You are performing a penetration test. You achieved access via a buffer overflow exploit and you proceed to find interesting data, such as files with usernames and passwords. You find a hidden folder that has the administrators bank account password and login information for the administrators bitcoin account.
What should you do?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following describes the characteristics of a Boot Sector Virus?
Exam 312-50 - admin post to:2017-07-05 read more

You have several plain-text firewall logs that you must review to evaluate network traffic. You know that in order to do fast, efficient searches of the logs you must use regular expressions.
Which command-line utility are you most likely to use?
Exam 312-50 - admin post to:2017-07-05 read more

Youve just been hired to perform a pen test on an organization that has been subjected to a large-scale attack. The CIO is concerned with mitigating threats and vulnerabilities to totally eliminate risk.
What is one of the first things you should do when given the job?
Exam 312-50 - admin post to:2017-07-05 read more

A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing in concluding the Operating System (OS) version installed. Considering the NMAP result below, which of the following is likely to be installed on the target machine by the OS? Starting NMAP 5.21 at 2011-03-15 11:06 NMAP scan report for 172.16.40.65 Host is up (1.00s latency). Not shown: 993 closed ports PORT STATE SERVICE 21/tcp open ftp 23/tcp open telnet 80/tcp open http 139/tcp open netbios-ssn 515/tcp open 631/tcp open ipp 9100/tcp open MAC Address: 00:00:48:0D:EE:8
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is the least-likely physical characteristic to be used in biometric control that supports a large company?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is not a Bluetooth attack?
Exam 312-50 - admin post to:2017-07-05 read more

This phase will increase the odds of success in later phases of the penetration test. It is also the very first step in Information Gathering, and it will tell you what the "landscape" looks like.
What is the most important phase of ethical hacking in which you need to spend a considerable amount of time?
Exam 312-50 - admin post to:2017-07-05 read more

The purpose of a __________ is to deny network access to local area networks and other information assets by unauthorized wireless devices.
Exam 312-50 - admin post to:2017-07-05 read more

> NMAP -sn 192.168.11.200-215
The NMAP command above performs which of the following?
Exam 312-50 - admin post to:2017-07-05 read more

You are using NMAP to resolve domain names into IP addresses for a ping sweep later.
Which of the following commands looks for IP addresses?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is a command line packet analyzer similar to GUI-based Wireshark?
Exam 312-50 - admin post to:2017-07-05 read more

The configuration allows a wired or wireless network interface controller to pass all traffic it receives to the central processing unit (CPU), rather than passing only the frames that the controller is intended to receive.
Which of the following is being described?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is an extremely common IDS evasion technique in the web world?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is the structure designed to verify and authenticate the identity of individuals within the enterprise taking part in a data exchange?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is a design pattern based on distinct pieces of software providing application functionality as services to other applications?
Exam 312-50 - admin post to:2017-07-05 read more

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is assured by the use of a hash?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is the greatest threat posed by backups?
Exam 312-50 - admin post to:2017-07-05 read more

An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up.
What is the most likely cause?
Exam 312-50 - admin post to:2017-07-05 read more

In Risk Management, how is the term "likelihood" related to the concept of "threat?"
Exam 312-50 - admin post to:2017-07-05 read more

The chance of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from the last backup to the new hard disk. The recovery person earns $10/hour. Calculate the SLE, ARO, and ALE. Assume the EF = 1 (100%).
What is the closest approximate cost of this replacement and recovery operation per year?
Exam 312-50 - admin post to:2017-07-05 read more

A network administrator discovers several unknown files in the root directory of his Linux FTP server. One of the files is a tarball, two are shell script files, and the third is a binary file is named "nc." The FTP servers access logs show that the anonymous user account logged in to the server, uploaded the files, and extracted the contents of the tarball and ran the script using a function provided by the FTP servers software. The ps command shows that the nc file is running as process, and the netstat command shows the nc process is listening on a network port.
What kind of vulnerability must be present to make this remote attack possible?
Exam 312-50 - admin post to:2017-07-05 read more

While performing online banking using a Web browser, a user receives an email that contains a link to an interesting Web site. When the user clicks on the link, another Web browser session starts and displays a video of cats playing a piano. The next business day, the user receives what looks like an email from his bank, indicating that his bank account has been accessed from a foreign country. The email asks the user to call his bank and verify the authorization of a funds transfer that took place.
What Web browser-based security vulnerability was exploited to compromise the user?
Exam 312-50 - admin post to:2017-07-05 read more

A companys security policy states that all Web browsers must automatically delete their HTTP browser cookies upon terminating. What sort of security breach is this policy attempting to mitigate?
Exam 312-50 - admin post to:2017-07-05 read more

A companys Web development team has become aware of a certain type of security vulnerability in their Web software. To mitigate the possibility of this vulnerability being exploited, the team wants to modify the software requirements to disallow users from entering HTML as input into their Web application.
What kind of Web application vulnerability likely exists in their software?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is considered the best way to protect Personally Identifiable Information (PII) from Web application vulnerabilities?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is one of the most effective ways to prevent Cross-site Scripting (XSS) flaws in software applications?
Exam 312-50 - admin post to:2017-07-05 read more

An Internet Service Provider (ISP) has a need to authenticate users connecting using analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network.
Which AAA protocol is most likely able to handle this requirement?
Exam 312-50 - admin post to:2017-07-05 read more

A new wireless client is configured to join a 802.11 network. This client uses the same hardware and software as many of the other clients on the network. The client can see the network, but cannot connect. A wireless packet sniffer shows that the Wireless Access Point (WAP) is not responding to the association requests being sent by the wireless client.
What is a possible source of this problem?
Exam 312-50 - admin post to:2017-07-05 read more

An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the networks external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file.
What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?
Exam 312-50 - admin post to:2017-07-05 read more

An attacker gains access to a Web servers database and displays the contents of the table that holds all of the names, passwords, and other user information. The attacker did this by entering information into the Web sites user login page that the softwares designers did not expect to be entered. This is an example of what kind of software design problem?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is a protocol specifically designed for transporting event messages?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following security operations is used for determining the attack surface of an organization?
Exam 312-50 - admin post to:2017-07-05 read more

The security concept of "separation of duties" is most similar to the operation of which type of security device?
Exam 312-50 - admin post to:2017-07-05 read more

The "black box testing" methodology enforces which kind of restriction?
Exam 312-50 - admin post to:2017-07-05 read more

The "gray box testing" methodology enforces what kind of restriction?
Exam 312-50 - admin post to:2017-07-05 read more

The "white box testing" methodology enforces what kind of restriction?
Exam 312-50 - admin post to:2017-07-05 read more

To determine if a software program properly handles a wide range of invalid input, a form of automated testing can be used to randomly generate invalid input in an attempt to crash the program.
What term is commonly used when referring to this type of testing?
Exam 312-50 - admin post to:2017-07-05 read more

To maintain compliance with regulatory requirements, a security audit of the systems on a network must be performed to determine their compliance with security policies. Which one of the following tools would most likely be used in such an audit?
Exam 312-50 - admin post to:2017-07-05 read more

Which of these options is the most secure procedure for storing backup tapes?
Exam 312-50 - admin post to:2017-07-05 read more

What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?
Exam 312-50 - admin post to:2017-07-05 read more

Risks = Threats x Vulnerabilities is referred to as the:
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is designed to identify malicious attempts to penetrate systems?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is a low-tech way of gaining unauthorized access to systems?
Exam 312-50 - admin post to:2017-07-05 read more

PGP, SSL, and IKE are all examples of which type of cryptography?
Exam 312-50 - admin post to:2017-07-05 read more

Which method of password cracking takes the most time and effort?
Exam 312-50 - admin post to:2017-07-05 read more

What is the most common method to exploit the “Bash Bug” or “ShellShock" vulnerability?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following tools is used to analyze the files produced by several packet-capture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?
Exam 312-50 - admin post to:2017-07-05 read more

Session splicing is an IDS evasion technique in which an attacker delivers data in multiple, smallsized packets to the target computer, making it very difficult for an IDS to detect the attack signatures.
Which tool can be used to perform session splicing attacks?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following tools can be used for passive OS fingerprinting?
Exam 312-50 - admin post to:2017-07-05 read more

You are the Systems Administrator for a large corporate organization. You need to monitor all network traffic on your local network for suspicious activities and receive notifications when an attack is occurring. Which tool would allow you to accomplish this goal?
Exam 312-50 - admin post to:2017-07-05 read more

What does a firewall check to prevent particular ports and applications from getting packets into an organization?
Exam 312-50 - admin post to:2017-07-05 read more

You work as a Security Analyst for a retail organization. In securing the companys network, you set up a firewall and an IDS. However, hackers are able to attack the network. After investigating, you discover that your IDS is not configured properly and therefore is unable to trigger alarms when needed. What type of alert is the IDS giving?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following types of firewalls ensures that the packets are part of the established session?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an organization?
Exam 312-50 - admin post to:2017-07-05 read more

Ricardo wants to send secret messages to a competitor company. To secure these messages, he uses a technique of hiding a secret message within an ordinary message. The technique provides security through obscurity.
What technique is Ricardo using?
Exam 312-50 - admin post to:2017-07-05 read more

During a security audit of IT processes, an IS auditor found that there were no documented security procedures. What should the IS auditor do?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following statements regarding ethical hacking is incorrect?
Exam 312-50 - admin post to:2017-07-05 read more

Craig received a report of all the computers on the network that showed all the missing patches and weak passwords. What type of software generated this report?
Exam 312-50 - admin post to:2017-07-05 read more

What two conditions must a digital signature meet?
Exam 312-50 - admin post to:2017-07-05 read more

An attacker is trying to redirect the traffic of a small office. That office is using their own mail server, DNS server and NTP server because of the importance of their job. The attacker gains access to the DNS server and redirects the direction www.google.com to his own IP address. Now when the employees of the office want to go to Google they are being redirected to the attacker machine. What is the name of this kind of attack?
Exam 312-50 - admin post to:2017-07-05 read more

If executives are found liable for not properly protecting their companys assets and information systems, what type of law would apply in this situation?
Exam 312-50 - admin post to:2017-07-05 read more

Which tier in the N-tier application architecture is responsible for moving and processing data between the tiers?
Exam 312-50 - admin post to:2017-07-05 read more

An attacker tries to do banner grabbing on a remote web server and executes the following command.
$ nmap -sV host.domain.com -p 80
He gets the following output. Starting Nmap 6.47 ( http://nmap.org ) at 2014-12-08 19:10 EST Nmap scan report for host.domain.com (108.61.158.211) Host is up (0.032s latency). PORT STATE SERVICE VERSION 80/tcp open http Apache httpd
Service detection performed. Please report any incorrect results at http://nmap.org/submit/. Nmap done: 1 IP address (1 host up) scanned in 6.42 seconds
What did the hacker accomplish?
Exam 312-50 - admin post to:2017-07-05 read more

_________ is a set of extensions to DNS that provide to DNS clients (resolvers) origin authentication of DNS data to reduce the threat of DNS poisoning, spoofing, and similar attacks types.
Exam 312-50 - admin post to:2017-07-05 read more

Sid is a judge for a programming contest. Before the code reaches him it goes through a restricted OS and is tested there. If it passes, then it moves onto Sid. What is this middle step called?
Exam 312-50 - admin post to:2017-07-05 read more

An IT employee got a call from one of our best customers. The caller wanted to know about the companys network infrastructure, systems, and team. New opportunities of integration are in sight for both company and customer. What should this employee do?
Exam 312-50 - admin post to:2017-07-05 read more

A well-intentioned researcher discovers a vulnerability on the web site of a major corporation. What should he do?
Exam 312-50 - admin post to:2017-07-05 read more

Rebecca commonly sees an error on her Windows system that states that a Data Execution Prevention (DEP) error has taken place. Which of the following is most likely taking place?
Exam 312-50 - admin post to:2017-07-05 read more

Attempting an injection attack on a web server based on responses to True/False questions is called which of the following?
Exam 312-50 - admin post to:2017-07-05 read more

In order to have an anonymous Internet surf, which of the following is best choice?
Exam 312-50 - admin post to:2017-07-05 read more

A penetration test was done at a company. After the test, a report was written and given to the companys IT authorities. A section from the report is shown below:
a.Access List should be written between VLANs.
b.Port security should be enabled for the intranet.
c.A security solution which filters data packets should be set between intranet (LAN) and DMZ.
d.A WAF should be used in front of the web applications.
According to the section from the report, which of the following choice is true?
Exam 312-50 - admin post to:2017-07-05 read more

Websites and web portals that provide web services commonly use the Simple Object Access Protocol SOAP. Which of the following is an incorrect definition or characteristics in the protocol?
Exam 312-50 - admin post to:2017-07-05 read more

An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?
Exam 312-50 - admin post to:2017-07-05 read more

A large mobile telephony and data network operator has a data that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems. What is the best security policy concerning this setup?
Exam 312-50 - admin post to:2017-07-05 read more

When purchasing a biometric system, one of the considerations that should be reviewed is the processing speed. Which of the following best describes what it is meant by processing?
Exam 312-50 - admin post to:2017-07-05 read more

Due to a slow down of normal network operations, IT department decided to monitor internet traffic for all of the employees. From a legal stand point, what would be troublesome to take this kind of measure?
Exam 312-50 - admin post to:2017-07-05 read more

In many states sending spam is illegal. Thus, the spammers have techniques to try and ensure that no one knows they sent the spam out to thousands of users at a time.
Which of the following best describes what spammers use to hide the origin of these types of e-mails?
Exam 312-50 - admin post to:2017-07-05 read more

You are an Ethical Hacker who is auditing the ABC company. When you verify the NOC one of the machines has 2 connections, one wired and the other wireless. When you verify the configuration of this Windows system you find two static routes.route add 10.0.0.0 mask 255.0.0.0 10.0.0.1 route add 0.0.0.0 mask 255.0.0.0 199.168.0.1
What is the main purpose of those static routes?
Exam 312-50 - admin post to:2017-07-05 read more

What is the correct process for the TCP three-way handshake connection establishment and connection termination?
Exam 312-50 - admin post to:2017-07-05 read more

Emil uses nmap to scan two hosts using this command.
nmap -sS -T4 -O 192.168.99.1 192.168.99.7
He receives this output:
Nmap scan report for 192.168.99.1 Host is up (0.00082s latency). Not shown: 994 filtered ports PORT STATE SERVICE 21/tcp open ftp 23/tcp open telnet 53/tcp open domain 80/tcp open http 161/tcp closed snmp MAC Address: B0:75:D5:33:57:74 (ZTE) Device type: general purpose Running: Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6 OS details: Linux 2.6.9 - 2.6.33 Network Distance: 1 hop
Nmap scan report for 192.168.99.7 Host is up (0.000047s latency). All 1000 scanned ports on 192.168.99.7 are closed Too many fingerprints match this host to give specific OS details Network Distance: 0 hops
What is his conclusion?
Exam 312-50 - admin post to:2017-07-05 read more

Youre doing an internal security audit and you want to find out what ports are open on all the servers. What is the best way to find out?
Exam 312-50 - admin post to:2017-07-05 read more

The establishment of a TCP connection involves a negotiation called 3 way handshake. What type of message sends the client to the server in order to begin this negotiation?
Exam 312-50 - admin post to:2017-07-05 read more

Internet Protocol Security IPSec is actually a suite of protocols. Each protocol within the suite provides different functionality. Collective IPSec does everything except.
Exam 312-50 - admin post to:2017-07-05 read more

Todd has been asked by the security officer to purchase a counter-based authentication system. Which of the following best describes this type of system?
Exam 312-50 - admin post to:2017-07-05 read more

An attacker attaches a rogue router in a network. He wants to redirect traffic to a LAN attached to his router as part of a man-in-the-middle attack. What measure on behalf of the legitimate admin can mitigate this attack?
Exam 312-50 - admin post to:2017-07-05 read more

Look at the following output. What did the hacker accomplish?
; <<>> DiG 9.7.-P1 <<>> axfr domam.com @192.168.1.105 ;; global options: +cmd domain.com. 3600 IN SOA srv1.domain.com. hostsrv1.domain.com. 131 900 600 86400 3600 domain.com. 600 IN A 192.168.1.102 domain.com. 600 IN A 192.168.1.105 domain.com. 3600 IN NS srv1.domain.com. domain.com. 3600 IN NS srv2.domain.com. vpn.domain.com. 3600 IN A 192.168.1.1 server.domain.com. 3600 IN A 192.168.1.3 office.domain.com. 3600 IN A 192.168.1.4 remote.domain.com. 3600 IN A 192.168. 1.48 support.domain.com. 3600 IN A 192.168.1.47 ns1.domain.com. 3600 IN A 192.168.1.41 ns2.domain.com. 3600 IN A 192.168.1.42 ns3.domain.com. 3600 IN A 192.168.1.34 ns4.domain.com. 3600 IN A 192.168.1.45 srv1.domain.com. 3600 IN A 192.168.1.102 srv2.domain.com. 1200 IN A 192.168.1.105 domain.com. 3600 INSOA srv1.domain.com. hostsrv1.domain.com. 131 900 600 86400 3600 ;; Query time: 269 msec ;; SERVER: 192.168.1.105#53(192.168.1.105) ;; WHEN: Sun Aug 11 20:07:59 2013 ;; XFR size: 65 records (messages 65, bytes 4501)
Exam 312-50 - admin post to:2017-07-05 read more

What network security concept requires multiple layers of security controls to be placed throughout an IT infrastructure, which improves the security posture of an organization to defend against malicious attacks or potential vulnerabilities?
Exam 312-50 - admin post to:2017-07-05 read more

Scenario:
1.Victim opens the attackers web site.
2.Attacker sets up a web site which contains interesting and attractive content like Do you want to make $1000 in a day?.
3.Victim clicks to the interesting and attractive content url.
4.Attacker creates a transparent iframe in front of the url which victim attempt to click, so victim thinks that he/she clicks to the Do you want to make $1000 in a day? url but actually he/she clicks to the content or url that exists in the transparent iframe which is setup by the attacker.
What is the name of the attack which is mentioned in the scenario?
Exam 312-50 - admin post to:2017-07-05 read more

If there is an Intrusion Detection System (IDS) in intranet, which port scanning technique cannot be used?
Exam 312-50 - admin post to:2017-07-05 read more

What is correct about digital signatures?
Exam 312-50 - admin post to:2017-07-05 read more

What is not a PCI compliance recommendation?
Exam 312-50 - admin post to:2017-07-05 read more

Which Intrusion Detection System is best applicable for large environments where critical assets on the network need extra security and is ideal for observing sensitive network segments?
Exam 312-50 - admin post to:2017-07-05 read more

An attacker is using nmap to do a ping sweep and a port scanning in a subnet of 254 addresses.
In which order should he perform these steps?
Exam 312-50 - admin post to:2017-07-05 read more

What mechanism in Windows prevents a user from accidentally executing a potentially malicious batch (.bat) or PowerShell (.ps1) script?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?
Exam 312-50 - admin post to:2017-07-05 read more

By using a smart card and pin, you are using a two-factor authentication that satisfies
Exam 312-50 - admin post to:2017-07-05 read more

What is the difference between the AES and RSA algorithms?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following programming languages is most susceptible to buffer overflow attacks, due to its lack of a built-in-bounds checking mechanism?
Code: #include int main(){
char buffer[8];
strcpy(buffer, ““11111111111111111111111111111””); }
Output: Segmentation fault
Exam 312-50 - admin post to:2017-07-05 read more

The security administrator of ABC needs to permit Internet traffic in the host 10.0.0.2 and UDP traffic in the host 10.0.0.3. Also he needs to permit all FTP traffic to the rest of the network and deny all other traffic. After he applied his ACL configuration in the router nobody can access to the ftp and the permitted hosts cannot access to the Internet. According to the next configuration what is happening in the network?
access-list 102 deny tcp any any access-list 104 permit udp host 10.0.0.3 any access-list 110 permit tcp host 10.0.0.2 eq www any access-list 108 permit tcp any eq ftp any
Exam 312-50 - admin post to:2017-07-05 read more

Bob received this text message on his mobile phone: ““Hello, this is Scott Smelby from the Yahoo Bank. Kindly contact me for a vital transaction on:
scottsmelby@yahoo.com””. Which statement below is true?
Exam 312-50 - admin post to:2017-07-05 read more

In an internal security audit, the white hat hacker gains control over a user account and attempts to acquire access to another accounts confidential files and information. How can he achieve this?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following will perform an Xmas scan using NMAP?
Exam 312-50 - admin post to:2017-07-05 read more

As an Ethical Hacker you are capturing traffic from your customer network with Wireshark and you need to find and verify just SMTP traffic. What command in Wireshark will help you to find this kind of traffic?
Exam 312-50 - admin post to:2017-07-05 read more

Which service in a PKI will vouch for the identity of an individual or company?
Exam 312-50 - admin post to:2017-07-05 read more

In IPv6 what is the major difference concerning application layer vulnerabilities compared to IPv4?
Exam 312-50 - admin post to:2017-07-05 read more

In which phase of the ethical hacking process can Google hacking be employed? This is a technique that involves manipulating a search string with specific operators to search for vulnerabilities.
Example: allintitle: root passwd
Exam 312-50 - admin post to:2017-07-05 read more

Which type of security feature stops vehicles from crashing through the doors of a building?
Exam 312-50 - admin post to:2017-07-05 read more

........is an attack type for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications. It is the wireless version of the phishing scam. An attacker fools wireless users into connecting a laptop or mobile phone to a tainted hotspot by posing as a legitimate provider. This type of attack may be used to steal the passwords of unsuspecting users by either snooping the communication link or by phishing, which involves setting up a fraudulent web site and luring people there.Fill in the blank with appropriate choice.
Exam 312-50 - admin post to:2017-07-05 read more

Which access control mechanism allows for multiple systems to use a central authentication server (CAS) that permits users to authenticate once and gain access to multiple systems?
Exam 312-50 - admin post to:2017-07-05 read more

What attack is used to crack passwords by using a precomputed table of hashed passwords?
Exam 312-50 - admin post to:2017-07-05 read more

Your next door neighbor, that you do not get along with, is having issues with their network, so he yells to his spouse the networks SSID and password and you hear them both clearly. What do you do with this information?
Exam 312-50 - admin post to:2017-07-05 read more

Shellshock had the potential for an unauthorized user to gain access to a server. It affected many internet-facing services, which OS did it not directly affect?
Exam 312-50 - admin post to:2017-07-05 read more

You want to analyze packets on your wireless network. Which program would you use?
Exam 312-50 - admin post to:2017-07-05 read more

It has been reported to you that someone has caused an information spillage on their computer. You go to the computer, disconnect it from the network, remove the keyboard and mouse, and power it down. What step in incident handling did you just complete?
Exam 312-50 - admin post to:2017-07-05 read more

#!/usr/bin/python import socket buffer=[“A”] counter=50 while len(buffer)<=100: buffer.apend (“A”*counter) counter=counter+50 commands= [“HELP”,“STATS.”,“RTIME.”,“LTIME.”,“SRUN.”,“TRUN.”,“GMON.”,“GDOG.”,“KSTET.”,“GTER.”,“HTER.”,“L TER.”,“KSTAN.”] for command in commands:
for buffstring in buffer: print “Exploiting” +command+“:”+str(len(buffstring)) s=socket.socket(socket.AF_INET.socket.SOCK_STREAM) s.connect((127.0.0.1,9999)) s.recv(50) s.send(command+buffstring) s.close()
What is the code written for?
Exam 312-50 - admin post to:2017-07-05 read more

An enterprise recently moved to a new office and the new neighborhood is a little risky. The CEO wants to monitor the physical perimeter and the entrance doors 24 hours. What is the best option to do this job?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet.
Exam 312-50 - admin post to:2017-07-05 read more

There are several ways to gain insight on how a cryptosystem works with the goal of reverse engineering the process. A term describes when two pieces of data result in the same value is?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following security policies defines the use of VPN for gaining access to an internal corporate network?
Exam 312-50 - admin post to:2017-07-05 read more

One of the Forbes 500 companies has been subjected to a large scale attack. You are one of the shortlisted pen testers that they may hire. During the interview with the CIO, he emphasized that he wants to totally eliminate all risks. What is one of the first things you should do when hired?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is an NMAP script that could help detect HTTP Methods such as GET, POST, HEAD, PUT, DELETE, TRACE?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following is the most important phase of ethical hacking wherein you need to spend considerable amount of time?
Exam 312-50 - admin post to:2017-07-05 read more

It is a short-range wireless communication technology that allows mobile phones, computers and other devices to connect and communicate. This technology intends to replace cables connecting portable devices with high regards to security.
Exam 312-50 - admin post to:2017-07-05 read more

Matthew received an email with an attachment named “YouWon$10Grand.zip.” The zip file contains a file named “HowToClaimYourPrize.docx.exe.” Out of excitement and curiosity, Matthew opened the said file. Without his knowledge, the file copies itself to Matthews APPDATAIocaI directory and begins to beacon to a Command-and-control server to download additional malicious binaries. What type of malware has Matthew encountered?
Exam 312-50 - admin post to:2017-07-05 read more

Which among the following is a Windows command that a hacker can use to list all the shares to which the current user context has access?
Exam 312-50 - admin post to:2017-07-05 read more

What is the approximate cost of replacement and recovery operation per year of a hard drive that has a value of $300 given that the technician who charges $10/hr would need 10 hours to restore OS and Software and needs further 4 hours to restore the database from the last backup to the new hard disk? Calculate the SLE, ARO, and ALE.
Assume the EF = 1 (100%).
Exam 312-50 - admin post to:2017-07-05 read more

Knowing the nature of backup tapes, which of the following is the MOST RECOMMENDED way of storing backup tapes?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following tools would MOST LIKELY be used to perform security audit on various of forms of network systems?
Exam 312-50 - admin post to:2017-07-05 read more

Security and privacy of/on information systems are two entities that requires lawful regulations. Which of the following regulations defines security and privacy controls for Federal information systems and organizations?
Exam 312-50 - admin post to:2017-07-05 read more

A big company, who wanted to test their security infrastructure, wants to hire elite pen testers like you. During the interview, they asked you to show sample reports from previous penetration tests. What should you do?
Exam 312-50 - admin post to:2017-07-05 read more

You are about to be hired by a well known Bank to perform penetration tests. Which of the following documents describes the specifics of the testing, the associated violations, and essentially protects both the banks interest and your liabilities as a tester?
Exam 312-50 - admin post to:2017-07-05 read more

The practical realities facing organizations today make risk response strategies essential. Which of the following is NOT one of the five basic responses to risk?
Exam 312-50 - admin post to:2017-07-05 read more

A company recently hired your team of Ethical Hackers to test the security of their network systems. The company wants to have the attack be as realistic as possible. They did not provide any information besides the name of their company. What phase of security testing would your team jump in right away?
Exam 312-50 - admin post to:2017-07-05 read more

TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. Which of the following tools can be used for passive OS fingerprinting?
Exam 312-50 - admin post to:2017-07-05 read more

The chance of a hard drive failure is known to be once every four years. The cost of a new hard drive is $500. EF (Exposure Factor) is about 0.5. Calculate for the Annualized Loss Expectancy (ALE).
Exam 312-50 - admin post to:2017-07-05 read more

Backing up data is a security must. However, it also have certain level of risks when mishandled. Which of the following is the greatest threat posed by backups?
Exam 312-50 - admin post to:2017-07-05 read more

What kind of risk will remain even if all theoretically possible safety measures would be applied?
Exam 312-50 - admin post to:2017-07-05 read more

While doing a Black box pen test via the TCP port (80), you noticed that the traffic gets blocked when you tried to pass IRC traffic from a web enabled host. However, you also noticed that outbound HTTP traffic is being allowed. What type of firewall is being utilized for the outbound traffic?
Exam 312-50 - admin post to:2017-07-05 read more

It is a widely used standard for message logging. It permits separation of the software that generates messages, the system that stores them, and the software that reports and analyzes them. This protocol is specifically designed for transporting event messages. Which of the following is being described?
Exam 312-50 - admin post to:2017-07-05 read more

While doing a technical assessment to determine network vulnerabilities, you used the TCP XMAS scan. What would be the response of all open ports?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following tools is used by pen testers and analysts specifically to analyze links between data using link analysis and graphs?
Exam 312-50 - admin post to:2017-07-05 read more

If you are to determine the attack surface of an organization, which of the following is the BEST thing to do?
Exam 312-50 - admin post to:2017-07-05 read more

What is the best Nmap command to use when you want to list all devices in the same network quickly after you successfully identified a server whose IP address is 10.10.0.5?
Exam 312-50 - admin post to:2017-07-05 read more

Youve just discovered a server that is currently active within the same network with the machine you recently compromised. You ping it but it did not respond. What could be the case?
Exam 312-50 - admin post to:2017-07-05 read more

Which of the following BEST describes the mechanism of a Boot Sector Virus?
Exam 312-50 - admin post to:2017-07-05 read more

What is the term coined for logging, recording and resolving events in a company?
Exam 312-50 - admin post to:2017-07-05 read more

XOR is a common cryptographic tool. 10110001 XOR 00111010 is?
Exam 312-50 - admin post to:2017-07-05 read more

A server has been infected by a certain type of Trojan. The hacker intended to utilize it to send and host junk mails. What type of Trojan did the hacker use?
Exam 312-50 - admin post to:2017-07-05 read more

First thing you do every office day is to check your email inbox. One morning, you received an email from your best friend and the subject line is quite strange. What should you do?
Exam 312-50 - admin post to:2017-07-05 read more

LM hash is a compromised password hashing function. Which of the following parameters describe LM Hash:? I – The maximum password length is 14 characters. II – There are no distinctions between uppercase and lowercase. III – Its a simple algorithm, so 10,000,000 hashes can be generated per second.
Exam 312-50 - admin post to:2017-07-05 read more

Defining rules, collaborating human workforce, creating a backup plan, and testing the plans are within what phase of the Incident Handling Process?
Exam 312-50 - admin post to:2017-07-05 read more