aiotestking uk

312-50 Exam Questions - Online Test


312-50 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Lori is a Certified Ethical Hacker as well as a Certified Hacking Forensics Investigator working as an IT security consultant. Lori has been hired on by Kiley Innovators, a large marketing firm that recently underwent a string of thefts and corporate espionage incidents. Lori is told that a rival marketing company came out with an exact duplicate product right before Kiley Innovators was about to release it. The executive team believes that an employee is leaking information to the rival company. Lori questions all employees, reviews server logs, and firewall logs; after which she finds nothing. Lori is then given permission to search through the corporate email system. She searches by email being sent to and sent from the rival marketing company. 

She finds one employee that appears to be sending very large email to this other marketing company, even though they should have no reason to be communicating with them. Lori tracks down the actual emails sent and upon opening them, only finds picture files attached to them. These files seem perfectly harmless, usually containing some kind of joke. Lori decides to use some special software to further examine the pictures and finds that each one had hidden text that was stored in each picture. 

What technique was used by the Kiley Innovators employee to send information to the rival marketing company? 

A. The Kiley Innovators employee used cryptography to hide the information in the emails sent 

B. The method used by the employee to hide the information was logical watermarking 

C. The employee used steganography to hide information in the picture attachments 

D. By using the pictures to hide information, the employee utilized picture fuzzing 

Answer: C

Q2. What are the four steps is used by nmap scanning? 

A. DNS Lookup 

B. ICMP Message 

C. Ping 

D. Reverse DNS lookup 

E. TCP three way handshake 

F. The Actual nmap scan 

Answer: ACDF

Explanation: Nmap performs four steps during a normal device scan. Some of these steps can be modified or disabled using options on the nmap command line. 

Q3. On wireless networks, a SSID is used to identify the network. Why are SSID not considered to be a good security mechanism to protect a wireless network? 

A. The SSID is only 32 bits in length 

B. The SSID is transmitted in clear text 

C. The SSID is to identify a station not a network 

D. The SSID is the same as the MAC address for all vendors 

Answer: B

Explanation: The use of SSIDs is a fairly weak form of security, because most access points broadcast the SSID, in clear text, multiple times per second within the body of each beacon frame. A hacker can easily use an 802.11 analysis tool (e.g., AirMagnet, Netstumbler, or AiroPeek) to identify the SSID. 

Q4. What is a NULL scan? 

A. A scan in which all flags are turned off 

B. A scan in which certain flags are off 

C. A scan in which all flags are on 

D. A scan in which the packet size is set to zero 

E. A scan with a illegal packet size 

Answer:

Explanation: A null scan has all flags turned off. 

Q5. SNMP is a connectionless protocol that uses UDP instead of TCP packets? (True or False) 

A. True 

B. False 

Answer: A

Explanation: TCP and UDP provide transport services. But UDP was preferred. This is due to TCP characteristics, it is a complicate protocol and it consume to many memory and CPU resources. Where as UDP is easy to build and run. Into devices (repeaters and modems) vendors have built simple version of IP and UDP. 

Q6. How many bits encryption does SHA-1 use? 

A. 64 bits 

B. 128 bits 

C. 160 bits 

D. 256 bits 

Answer: C

Explanation: SHA-1 (as well as SHA-0) produces a 160-bit digest from a message with a maximum length of 264 - 1 bits, and is based on principles similar to those used by Professor Ronald L. Rivest of MIT in the design of the MD4 and MD5 message digest algorithms. 

Q7. Exhibit: 

Given the following extract from the snort log on a honeypot, what service is being exploited? : 

A. FTP 

B. SSH 

C. Telnet 

D. SMTP 

Answer:

Explanation: The connection is done to 172.16.1.104:21. 

Q8. Bob has set up three web servers on Windows Server 2003 IIS 6.0. Bob has followed all the recommendations for securing the operating system and IIS. These servers are going to run numerous e-commerce websites that are projected to bring in thousands of dollars a day. Bob is still concerned about the security of this server because of the potential for financial loss. Bob has asked his company’s firewall administrator to set the firewall to inspect all incoming traffic on ports 80 and 443 to ensure that no malicious data is getting into the network. 

Why will this not be possible? 

A. Firewalls can’t inspect traffic coming through port 443 

B. Firewalls can only inspect outbound traffic 

C. Firewalls can’t inspect traffic coming through port 80 

D. Firewalls can’t inspect traffic at all, they can only block or allow certain ports 

Answer:

Explanation: In order to really inspect traffic and traffic patterns you need an IDS. 

Q9. This attack technique is used when a Web application is vulnerable to an SQL Injection but the results of the Injection are not visible to the attacker. 

A. Unique SQL Injection 

B. Blind SQL Injection 

C. Generic SQL Injection 

D. Double SQL Injection 

Answer: B

Q10. What are the three phases involved in security testing? 

A. Reconnaissance, Conduct, Report 

B. Reconnaissance, Scanning, Conclusion 

C. Preparation, Conduct, Conclusion 

D. Preparation, Conduct, Billing 

Answer: C

Explanation: Preparation phase - A formal contract is executed containing non-disclosure of the client's data and legal protection for the tester. At a minimum, it also lists the IP addresses to be tested and time to test. Conduct phase - In this phase the penetration test is executed, with the tester looking for potential vulnerabilities. Conclusion phase - The results of the evaluation are communicated to the pre-defined organizational contact, and corrective action is advised.