aiotestking uk

312-50v9 Exam Questions - Online Test


312-50v9 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Which of the followingtypes of firewalls ensures that the packets are part of the established session?

A. Switch-level firewall

B. Stateful inspection firewall

C. Application-level firewall

D. Circuit-level firewall

Answer: B

Q2. A common cryptographically tool is the use of XOR. XOR the following binary value: 10110001

00111010

A. 10001011

B. 10011101

C. 11011000

D. 10111100

Answer: A

Q3. You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly.

What is the best nmap command you will use?

A. Nmap –T4 –F 10.10.0.0/24 

B. Nmap –T4 –q 10.10.0.0/24 

C. Nmap –T4 –O 10.10.0.0/24 

D. Nmap –T4 –r 10.10.0.0/24

Answer: A

Q4. How does the Address Resolution Protocol (ARP) work?

A. It sends a reply packet for a specific IP, asking for the MAC address.

B. It sends a reply packet to all the network elements, asking for the MAC address from a specific IP.

C. It sends a request packet to all the network elements, asking for the domainname from a specific IP.

D. It sends a request packet to all the network elements, asking for the MAC address from a specific IP.

Answer: D

Q5. You are usingNMAP to resolve domain names into IP addresses for a ping sweep later. Which of the following commands looks for IP addresses?

A. >host –t ns hackeddomain.com

B. >host –t AXFR hackeddomain.com

C. >host –t soa hackeddomain.com

D. >host –t a hackeddomain.com

Answer: D

Q6. What is the process of logging, recording, and resolving events that take place in an organization?

A. Metrics

B. Security Policy

C. Internal Procedure

D. Incident Management Process

Answer: D

Q7. An Internet Service Provider (ISP) has a need to authenticate users connecting using analog modems, digital Subscriber Line (DSL), wireless data services, and virtual Private Networks (VPN) over a Frame Relay network.

Which AAA protocol is most likely able to handle this requirement?

A. DIAMETER

B. Kerberos

C. RADIUS

A. D. TACACS+

Answer: D

Q8. You have successfully gained access to your client’s internal network and successfully comprised a linux server which is part of the internal IP network. You want to know which

Microsoft Windows workstation have the sharing enabled.

Which port would you see listeningon these Windows machines in the network?

A. 1443

B. 3389

C. 161

D. 445

Answer: D

Q9. The phase will increase the odds of success in later phases of the penetration test. It is also the very first step in Information Gathering, and it will tell you what the“landscape” looks like.

What is the most important phase of ethical hacking in which you need to spend a considerable amount of time?

A. Network Mapping

B. Gaining access

C. Footprinting

D. Escalating privileges

Answer: C

Q10. Which of the following is component of a risk assessment?

A. Logical interface

B. DMZ

C. Administrative safeguards

D. Physical security

Answer: C