★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 312-50 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/312-50-dumps.html


Q101. Fred is scanning his network to ensure it is as secure as possible. Fred sends a TCP probe packet to a host with a FIN flag and he receives a RST/ACK response. What does this mean? 

A. This response means the port he is scanning is open. 

B. The RST/ACK response means the port Fred is scanning is disabled. 

C. This means the port he is scanning is half open. 

D. This means that the port he is scanning on the host is closed. 

Answer: D


Q102. Which of the following statement correctly defines ICMP Flood Attack? (Select 2 answers) A. Bogus ECHO reply packets are flooded on the network spoofing the IP and MAC address 

B. The ICMP packets signal the victim system to reply and the combination of traffic saturates the bandwidth of the victim's network 

C. ECHO packets are flooded on the network saturating the bandwidth of the subnet causing denial of service 

D. A DDoS ICMP flood attack occurs when the zombies send large volumes of ICMP_ECHO_REPLY packets to the victim system. 

Answer: BD


Q103. A majority of attacks come from insiders, people who have direct access to a company's computer system as part of their job function or a business relationship. Who is considered an insider? 

A. The CEO of the company because he has access to all of the computer systems 

B. A government agency since they know the company computer system strengths and weaknesses 

C. Disgruntled employee, customers, suppliers, vendors, business partners, contractors, temps, and consultants 

D. A competitor to the company because they can directly benefit from the publicity generated by making such an attack 

Answer:

Explanation: An insider is anyone who already has an foot inside one way or another. 


Q104. Attackers send an ACK probe packet with random sequence number, no response means port is filtered (Stateful firewall is present) and RST response means the port is not filtered. What type of Port Scanning is this? 

A. RST flag scanning 

B. FIN flag scanning 

C. SYN flag scanning 

D. ACK flag scanning 

Answer: D


Q105. What are the six types of social engineering?(Choose six). 

A. Spoofing 

B. Reciprocation 

C. Social Validation 

D. Commitment 

E. Friendship 

F. Scarcity 

G. Authority 

H. Accountability 

Answer: BCDEFG

Explanation: All social engineering is performed by taking advantage of human nature. For in-depth information on the subject review, read Robert Cialdini's book, Influence: Science and Practice. 


Q106. Which of the following attacks takes best advantage of an existing authenticated connection 

A. Spoofing 

B. Session Hijacking 

C. Password Sniffing 

D. Password Guessing 

Answer: B

Explanation: Session hijacking is the act of taking control of a user session after successfully obtaining or generating an authentication session ID. Session hijacking involves an attacker using captured, brute forced or reverse-engineered session IDs to seize control of a legitimate user's Web application session while that session is still in progress. 


Q107. Peter is a Linux network admin. As a knowledgeable security consultant, he turns to you to look for help on a firewall. He wants to use Linux as his firewall and use the latest freely available version that is offered. What do you recommend? 

Select the best answer. 

A. Ipchains 

B. Iptables 

C. Checkpoint FW for Linux 

D. Ipfwadm 

Answer:

Explanation:

Ipchains was improved over ipfwadm with its chaining mechanism so that it can have multiple rulesets. However, it isn't the latest version of a free Linux firewall. Iptables replaced ipchains and is the latest of the free Linux firewall tools. Any Checkpoint firewall is not going to meet Jason's desire to have a free firewall. Ipfwadm is used to build Linux firewall rules prior to 2.2.0. It is a outdated version. 


Q108. What does the following command achieve? 

Telnet <IP Address> <Port 80> 

HEAD /HTTP/1.0 

<Return> 

<Return> 

A. This command returns the home page for the IP address specified 

B. This command opens a backdoor Telnet session to the IP address specified 

C. This command returns the banner of the website specified by IP address 

D. This command allows a hacker to determine the sites security 

E. This command is bogus and will accomplish nothing 

Answer: C

Explanation: This command is used for banner grabbing. Banner grabbing helps identify the service and version of web server running. 


Q109. LAN Manager passwords are concatenated to 14 bytes and split in half. The two halves are hashed individually. If the password is 7 characters or less, than the second half of the hash is always: 

A. 0xAAD3B435B51404EE 

B. 0xAAD3B435B51404AA 

C. 0xAAD3B435B51404BB 

D. 0xAAD3B435B51404CC 

Answer: A

Explanation: A problem with LM stems from the total lack of salting or cipher block chaining in the hashing process. To hash a password the first 7 bytes of it are transformed into an 8 byte odd parity DES key. This key is used to encrypt the 8 byte string "KGS!@". Same thing happens with the second part of the password. This lack of salting creates two interesting consequences. Obviously this means the password is always stored in the same way, and just begs for a typical lookup table attack. The other consequence is that it is easy to tell if a password is bigger than 7 bytes in size. If not, the last 7 bytes will all be null and will result in a constant DES hash of 0xAAD3B435B51404EE. 


Q110. Which are true statements concerning the BugBear and Pretty Park worms? 

Select the best answers. 

A. Both programs use email to do their work. 

B. Pretty Park propagates via network shares and email 

C. BugBear propagates via network shares and email 

D. Pretty Park tries to connect to an IRC server to send your personal passwords. 

E. Pretty Park can terminate anti-virus applications that might be running to bypass them. 

Answer: ACD

Explanations: Both Pretty Park and BugBear use email to spread. Pretty Park cannot propagate via network shares, only email. BugBear propagates via network shares and email. It also terminates anti-virus applications and acts as a backdoor server for someone to get into the infected machine. Pretty Park tries to connect to an IRC server to send your personal passwords and all sorts of other information it retrieves from your PC. Pretty Park cannot terminate anti-virus applications. However, BugBear can terminate AV software so that it can bypass them. 

Topic 17, Physical Security 

432. Joseph has just been hired on to a contractor company of the Department of Defense as their senior Security Analyst. Joseph has been instructed on the Company’s strict security policies that have been implemented and the policies that have yet to be put in place. Per the Department of Defense, all DoD users and the users of their contractors must use two-factor authentication to access their networks. Joseph has been delegated the task of researching and implementing the best two-factor authentication method for his company. Joseph’s supervisor has told him that they would like to use some type of hardware device in tandem with a security or identifying pin number. 

Joseph’s company has already researched using smart cards and all the resources needed to implement them, but found the smart cards to not be cost effective. What type of device should Joseph use for two-factor authentication? 

A. Security token 

B. Biometric device 

C. OTP 

D. Proximity cards 

Answer: A

Explanation: A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service. The device may be in the form of a smart card or may be embedded in a commonly used object such as a key fob. Security tokens provide an extra level of assurance through a method known as two-factor authentication: the user has a personal identification number (PIN), which authorizes them as the owner of that particular device; the device then displays a number which uniquely identifies the user to the service, allowing them to log in.