This page was exported from Braindump2go Exam Dumps Free Download
[
https://www.pass4surevce.com
]
Export date: Thu Mar 28 13:42:34 2024 / +0000 GMT
2018/10/24 Braindump2go 312-50v10 Exam Dumps with PDF and VCE New Updated Today! Following are some new 312-50v10 Real Exam Questions: 1.|2018 Latest 312-50v10 Exam Dumps (PDF & VCE) 242Q&As Download: 2.|2018 Latest 312-50v10 Exam Questions & Answers Download: QUESTION 173 A. Something you know and something you are Answer: B QUESTION 174 A. Algorithm is not the secret; key is the secret. Answer: C QUESTION 175 A. Both are symmetric algorithms, but AES uses 256-bit keys Answer: D QUESTION 176 A. Wired Equivalent Privacy (WEP) Answer: A QUESTION 177 A. Both static routes indicate that the traffic is external with different gateway. Answer: D QUESTION 178 A. The network devices are not all synchronized. Answer: A QUESTION 179 A. The sequence does not matter. Both steps have to be performed against all hosts. Answer: C QUESTION 180 A. The hacker used who is to gather publicly available records for the domain. Answer: D QUESTION 181 A. Application Layer Answer: D QUESTION 182 A. Use fences in the entrance doors. Answer: B QUESTION 183 A. A fingerprint scanner and his username and password Answer: A 1.|2018 Latest 312-50v10 Exam Dumps (PDF & VCE) 242Q&As Download: 2.|2018 Latest 312-50v10 Study Guide Video:
By using a smart card and pin, you are using a two-factor authentication that satisfies
B. Something you have and something you know
C. Something you have and something you are
D. Something you are and something you remember
Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and that are related to various aspects in information security such as data confidentially, data integrity, authentication, and non-repudiation. Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.
Basic example to understand how cryptography works is given below:
Which of the following choices true about cryptography?
B. Public-key cryptography, also known as asymmetric cryptography, public key is for decrypt, private key is for encrypt.
C. Secure Sockets Layer (SSL) use the asymmetric encryption both (public/private key pair) to deliver the shared session key and to achieve a communication way.
D. Symmetric-key algorithms are a class of algorithms for cryptography that use the different cryptographic keys for both encryption of plaintext and decryption of ciphertext.
What is the difference between the AES and RSA algorithms?
B. AES is asymmetric, which is used to create a public/private key pair; RSA is symmetric, which is used to encrypt data
C. Both are asymmetric algorithms, but RSA uses 1024-bit keys
D. RSA is asymmetric, which is used to create a public/private key pair; AES is symmetric, which is used to encrypt data
In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.
Which Algorithm is this referring to?
B. Wi-Fi Protected Access (WPA)
C. Wi-Fi Protected Access 2 (WPA2)
D. Temporal Key Integrity Protocol (TKIP)
You are an Ethical Hacker who is auditing the ABC company. When you verify the NOC one of the machines has 2 connections, one wired and the other wireless. When you verify the configuration of this Windows system you find two static routes.
route add 10.0.0.0 mask 255.0.0.0 10.0.0.1
route add 0.0.0.0 mask 255.0.0.0 199.168.0.1
What is the main purpose of those static routes?
B. The first static route indicates that the internal traffic will use an external gateway and the second static route indicates that the traffic will be rerouted.
C. Both static routes indicate that the traffic is internal with different gateway.
D. The first static route indicates that the internal addresses are using the internal gateway and the second static route indicates that all the traffic that is not internal must go to an external gateway.
An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up.
What is the most likely cause?
B. Proper chain of custody was not observed while collecting the logs.
C. The attacker altered or erased events from the logs.
D. The security breach was a false positive.
An attacker is using nmap to do a ping sweep and a port scanning in a subnet of 254 addresses.
In which order should he perform these steps?
B. First the port scan to identify interesting services and then the ping sweep to find hosts responding to icmp echo requests.
C. First the ping sweep to identify live hosts and then the port scan on the live hosts. This way he saves time.
D. The port scan alone is adequate. This way he saves time.
Look at the following output. What did the hacker accomplish?
B. The hacker used the "fierce" tool to brute force the list of available domains.
C. The hacker listed DNS records on his own domain.
D. The hacker successfully transferred the zone and enumerated the hosts.
Which tier in the N-tier application architecture is responsible for moving and processing data between the tiers?
B. Data tier
C. Presentation tier
D. Logic tier
An enterprise recently moved to a new office and the new neighborhood is a little risky. The CEO wants to monitor the physical perimeter and the entrance doors 24 hours. What is the best option to do this job?
B. Install a CCTV with cameras pointing to the entrance doors and the street.
C. Use an IDS in the entrance doors and install some of them near the corners.
D. Use lights in all the entrance doors and along the company's perimeter.
Bob learned that his username and password for a popular game has been compromised. He contacts the company and resets all the information. The company suggests he use two-factor authentication; which option below offers that?
B. His username and a stronger password
C. A new username and password
D. Disable his username and use just a fingerprint scanner
!!!RECOMMEND!!!
YouTube Video: YouTube.com/watch?v=tI9A-zhnAOQ
Post date: 2018-10-25 01:42:56
Post date GMT: 2018-10-25 01:42:56
Post modified date: 2018-10-25 01:42:56
Post modified date GMT: 2018-10-25 01:42:56
Powered by [ Universal Post Manager ] plugin. MS Word saving format developed by gVectors Team www.gVectors.com