Certbus > NetApp > New Release > 312-50V8 > 312-50V8 Online Practice Questions and Answers

312-50V8 Online Practice Questions and Answers

Questions 4

During a blackbox pen test you attempt to pass IRC traffic over post 80/TCP from a compromised web enabled host. The traffic gets blocked; however outbound HTTP traffic is unimpeded.

What type of firewall is inspecting outbound traffic?

A. Circuit

B. Packet Filtering

C. Application

D. Stateful

Browse 1008 Q&As
Questions 5

Jim's organization has just completed a major Linux roll out and now all of the organization's systems are running the Linux 2.5 kernel. The roll out expenses has posed constraints on purchasing other essential security equipment and software. The organization requires an option to control network traffic and also perform stateful inspection of traffic going into and out of the DMZ.

Which built-in functionality of Linux can achieve this?

A. IP Tables

B. IP Chains

C. IP Sniffer

D. IP ICMP

Browse 1008 Q&As
Questions 6

Fingerprinting an Operating System helps a cracker because:

A. It defines exactly what software you have installed

B. It opens a security-delayed window based on the port being scanned

C. It doesn't depend on the patches that have been applied to fix existing security holes

D. It informs the cracker of which vulnerabilities he may be able to exploit on your system

Browse 1008 Q&As
Questions 7

The Open Web Application Security Project (OWASP) testing methodology addresses the need to secure web applications by providing which one of the following services?

A. An extensible security framework named COBIT

B. A list of flaws and how to fix them

C. Web application patches

D. A security certification for hardened web applications

Browse 1008 Q&As
Questions 8

A tester has been using the msadc.pl attack script to execute arbitrary commands on a Windows NT4 web server. While it is effective, the tester finds it tedious to perform extended functions.

On further research, the tester come across a perl script that runs the following msadc functions:system ("perl msadc.pl -h $host -C \"echo open $your >testfile\"");

Which exploit is indicated by this script?

A. A buffer overflow exploit

B. A chained exploit

C. A SQL injection exploit

D. A denial of service exploit

Browse 1008 Q&As
Questions 9

ICMP ping and ping sweeps are used to check for active systems and to check

A. if ICMP ping traverses a firewall.

B. the route that the ICMP ping took.

C. the location of the switchport in relation to the ICMP ping.

D. the number of hops an ICMP ping takes to reach a destination.

Browse 1008 Q&As
Questions 10

To reduce the attack surface of a system, administrators should perform which of the following processes to remove unnecessary software, services, and insecure configuration settings?

A. Harvesting

B. Windowing

C. Hardening

D. Stealthing

Browse 1008 Q&As
Questions 11

Which type of password cracking technique works like dictionary attack but adds some numbers and symbols to the words from the dictionary and tries to crack the password?

A. Dictionary attack

B. Brute forcing attack

C. Hybrid attack

D. Syllable attack

E. Rule-based attack

Browse 1008 Q&As
Questions 12

Lauren is performing a network audit for her entire company. The entire network is comprised of around

500 computers. Lauren starts an ICMP ping sweep by sending one IP packet to the broadcast address of

the network, but only receives responses from around five hosts.

Why did this ping sweep only produce a few responses?

A. Only Windows systems will reply to this scan.

B. A switched network will not respond to packets sent to the broadcast address.

C. Only Linux and Unix-like (Non-Windows) systems will reply to this scan.

D. Only servers will reply to this scan.

Browse 1008 Q&As
Questions 13

Jeremy is web security consultant for Information Securitas. Jeremy has just been hired to perform contract work for a large state agency in Michigan. Jeremy's first task is to scan all the company's external websites. Jeremy comes upon a login page which appears to allow employees access to sensitive areas on the website. James types in the following statement in the username field:

SELECT * from Users where username='admin' ?AND password='' AND email like '%@testers.com%'

What will the SQL statement accomplish?

A. If the page is susceptible to SQL injection,it will look in the Users table for usernames of admin

B. This statement will look for users with the name of admin,blank passwords,and email addresses that end in @testers.com

C. This Select SQL statement will log James in if there are any users with NULL passwords

D. James will be able to see if there are any default user accounts in the SQL database

Browse 1008 Q&As
Questions 14

Low humidity in a data center can cause which of the following problems?

A. Heat

B. Corrosion

C. Static electricity

D. Airborne contamination

Browse 1008 Q&As
Questions 15

In which part of OSI layer, ARP Poisoning occurs?

A. Transport Layer

B. Datalink Layer

C. Physical Layer

D. Application layer

Browse 1008 Q&As
Questions 16

In the context of Trojans, what is the definition of a Wrapper?

A. An encryption tool to protect the Trojan

B. A tool used to bind the Trojan with a legitimate file

C. A tool used to calculate bandwidth and CPU cycles wasted by the Trojan

D. A tool used to encapsulate packets within a new header and footer

Browse 1008 Q&As
Questions 17

Web servers often contain directories that do not need to be indexed. You create a text file with search

engine indexing restrictions and place it on the root directory of the Web Server.

User-agent: *

Disallow: /images/

Disallow: /banners/

Disallow: /Forms/

Disallow: /Dictionary/

Disallow: /_borders/

Disallow: /_fpclass/

Disallow: /_overlay/

Disallow: /_private/

Disallow: /_themes/

What is the name of this file?

A. robots.txt

B. search.txt

C. blocklist.txt

D. spf.txt

Browse 1008 Q&As
Questions 18

Which is the right sequence of packets sent during the initial TCP three way handshake?

A. FIN,FIN-ACK,ACK

B. SYN,URG,ACK

C. SYN,ACK,SYN-ACK

D. SYN,SYN-ACK,ACK

Browse 1008 Q&As
Exam Code: 312-50V8
Exam Name: Certified Ethical Hacker v8
Last Update: Apr 09, 2024
Questions: 1008 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99