P.S. Tested 312-50v10 class are available on Google Drive, GET MORE: https://drive.google.com/open?id=1Eru4mEcUV0ULWTU_25JjeXA4U_MAK122
Question No: 9
This asymmetry cipher is based on factoring the product of two large prime numbers. What cipher is described above?
A. SHA
B. RSA
C. MD5
D. RC5
Answer: B
Question No: 10
Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?
A. Internet Key Exchange (IKE)
B. Oakley
C. IPsec Policy Agent
D. IPsec driver
Answer: A
Question No: 11
It has been reported to you that someone has caused an information spillage on their computer. You go to the computer, disconnect it from the network, remove the keyboard and mouse, and power it down. What step in incident handling did you just complete?
A. Discovery
B. Recovery
C. Containment
D. Eradication
Answer: C
Question No: 12
You are logged in as a local admin on a Windows 7 system and you need to launch the Computer Management Console from command line.
Which command would you use?
A. c:\gpedit
B. c:\compmgmt.msc
C. c:\ncpa.cp
D. c:\services.msc
Answer: B
Question No: 13
Based on the below log, which of the following sentences are true?
Mar 1, 2021, 7:33:28 AM 10.240.250.23 u2013 54373 10.249.253.15 u2013 22 tcp_ip
A. SSH communications are encrypted itu2021s impossible to know who is the client or the server
B. Application is FTP and 10.240.250.23 is the client and 10.249.253.15 is the server
C. Application is SSH and 10.240.250.23 is the client and 10.249.253.15 is the server
D. Application is SSH and 10.240.250.23 is the server and 10.249.253.15 is the server
Answer: C
Question No: 14
Which of the following is a serious vulnerability in the popular OpenSSL cryptographic software library? This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet.
A. SSL/TLS Renegotiation Vulnerability
B. Shellshock
C. Heartbleed Bug
D. POODLE
Answer: C
Question No: 15
You are doing an internal security audit and intend to find out what ports are open on all the servers. What is the best way to find out?
A. Scan servers with Nmap
B. Scan servers with MBSA
C. Telnet to every port on each server
D. Physically go to each server
Answer: A
Question No: 16
Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access?
A. Bootrom Exploit
B. iBoot Exploit
C. Sandbox Exploit
D. Userland Exploit
Answer: D
Question No: 17
To determine if a software program properly handles a wide range of invalid input, a form of automated testing can be used to randomly generate invalid input in an attempt to crash the program.
What term is commonly used when referring to this type of testing?
A. Randomizing
B. Bounding
C. Mutating
D. Fuzzing
Answer: D
Question No: 18
If an attacker uses the command SELECT*FROM user WHERE name = u2021xu2021 AND userid IS NULL; --u2021; which type of SQL injection attack is the attacker performing?
A. End of Line Comment
B. UNION SQL Injection
C. Illegal/Logically Incorrect Query
D. Tautology
Answer: D
P.S. Easily pass 312-50v10 Exam with Certleader Tested Dumps & pdf vce, Try Free: https://www.certleader.com/312-50v10-dumps.html ( New Questions)