https://killexams.com/pass4sure/exam-detail/312-50v9
Question: 490
An NMAP scan of a server shows port 25 is open. What risk could this pose?
A. Open printer sharing
B. Web portal data leak
C. Clear text authentication
D. Active mail relay
Answer: D
Question: 491
A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing in concluding the
Operating System (OS) version installed. Considering the NMAP result below, which of the following is likely to be installed on the target
machine by the OS?
Starting NMAP 5.21 at 2011-03-15 11:06 NMAP scan report for 172.16.40.65 Host is up (1.00s latency).
Not shown: 993 closed ports
PORT STATE SERVICE
21/tcp open ftp
23/tcp open telnet
80/tcp open http
139/tcp open netbios-ssn
515/tcp open
631/tcp open ipp
9100/tcp open
MAC Address: 00:00:48:0D:EE:89
A. The host is likely a Windows machine.
B. The host is likely a Linux machine.
C. The host is likely a router.
D. The host is likely a printer.
Answer: D
Question: 492
What type of OS fingerprinting technique sends specially crafted packets to the remote OS and analyzes the received response?
A. Passive
B. Reflective
C. Active
D. Distributive
Answer: C
Question: 493
Which of the following programs is usually targeted at Microsoft Office products?
A. Polymorphic virus
B. Multipart virus
C. Macro virus
D. Stealth virus
Answer: C
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g.,
word processors and spreadsheet applications). Some applications, such as Microsoft Office, allow macro programs to be embedded in
documents such that the macros are run automatically when the document is opened, and this provides a distinct mechanism by which malicious
computer instructions can spread.
References: https://en.wikipedia.org/wiki/Macro_virus
Question: 494
Bluetooth uses which digital modulation technique to exchange information between paired devices?
A. PSK (phase-shift keying)
B. FSK (frequency-shift keying)
C. ASK (amplitude-shift keying)
D. QAM (quadrature amplitude modulation)
Answer: A
Phase shift keying is the form of Bluetooth modulation used to enable the higher data rates achievable with Bluetooth 2 EDR (Enhanced Data
Rate). Two forms of PSK are used: p/4 DQPSK, and 8DPSK.
References: http://www.radio-electronics.com/info/wireless/bluetooth/radio-interface-modulation.php
Question: 495
In order to show improvement of security over time, what must be developed?
A. Reports
B. Testing tools
C. Metrics
D. Taxonomy of vulnerabilities
Answer: C
Today, management demands metrics to get a clearer view of security.
Metrics that measure participation, effectiveness, and window of exposure, however, offer information the organization can use to make plans
and improve programs.
References: http://www.infoworld.com/article/2974642/security/4-security-metrics-that-matter.html
Question: 496
Passive reconnaissance involves collecting information through which of the following?
A. Social engineering
B. Network traffic sniffing
C. Man in the middle attacks
D. Publicly accessible sources
Answer: D
Question: 497
Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?
A. Restore a random file.
B. Perform a full restore.
C. Read the first 512 bytes of the tape.
D. Read the last 512 bytes of the tape.
Answer: B
A full restore is required.
Question: 498
Which of the following describes the characteristics of a Boot Sector Virus?
A. Moves the MBR to another location on the RAM and copies itself to the original location of the MBR
B. Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR
C. Modifies directory table entries so that directory entries point to the virus code instead of the actual program
D. Overwrites the original MBR and only executes the new virus code
Answer: B
A boot sector virus is a computer virus that infects a storage device�s master boot record (MBR). The virus moves the boot sector to another
location on the hard drive.
References: https://www.techopedia.com/definition/26655/boot-sector-virus
For More exams visit https://killexams.com/vendors-exam-list
Kill your exam at First Attempt....Guaranteed!
No comments:
Post a Comment