You are on page 1of 6

EC Council 312-50V9 exam in just 24

HOURS!
REAL EXAM QUESTIONS ANSWERS
312-50V9
Buy Complete Questions Answers File from

http://www.pass4suredumps.in/312-50v9.html
100% Exam Passing Guarantee & Money Back
Assurance

QUESTION 1:
Which of the following is component of a risk assessment?
A. Logical interface
B. DMZ
C. Administrative safeguards
D. Physical security
Answer: C

QUESTION 2:
The purpose of a ____________ is to deny network access to local area networks
and other information assets by unauthorized wireless devices.
A. Wireless Access Point
B. Wireless Analyzer
C. Wireless Access Control list
D. Wireless Intrusion Prevention System
Answer: D

QUESTION 3:
An attacker gains access to a Web servers database and display the contents of
the table that holds all of the names, passwords, and other user information. The
attacker did this by entering information into the Web site's user login page that
the software's designers did not expect to be entered. This is an example of what
kind of software design problem?
A. Insufficient security management
B. Insufficient database hardening
C. Insufficient exception handling
D. Insufficient input validation
Answer: D

QUESTION 4:
You have successfully compromised a machine on the network and found a
server that is alive on the same network. You tried to ping but you didnt get any
response back.What is happening?
A. TCP/IP doesnt support ICMP.
B. ICMP could be disabled on the target server.
C. The ARP is disabled on the target server.
D. You need to run the ping command with root privileges .
Answer: A

QUESTION 5:
It is a short-range wireless communication technology intended to replace the
cables connecting portables of fixed deviceswhile maintaining high levels of
security. It allows mobile phones, computers and other devices to connect and
communicate using a shortrange wireless connection. Which of the following
terms best matches the definition?
A. Bluetooth
B. Radio-Frequency Identification
C. WLAN
D. InfraRed
Answer: A

QUESTION 6:
The Open Web Application Security Project (OWASP) isthe worldwide not-forprofit charitable organization focused on improving the security of software.
What item is the primary concern on OWASPs Top Ten Project most Critical Web
application Security Rules?
A. Injection
B. Cross site Scripting
C. Cross site Request Forgery
D. Path Disclosure

Answer: A

QUESTION 7:
Session splicing is an IDS evasiontechnique in which an attacker delivers data in
multiple, smallsized packets to the target computer, making it very difficult for an
IDS to detect the attack signatures. Which tool can used to perform session
splicing attacks?
A. Hydra
B. Burp
C. Whisker
D. Tcpsplice
Answer: C

QUESTION 8:
Which of the following isthe greatest threat posed by backups?
A. An un-encrypted backup can be misplaced or stolen
B. A back is incomplete because no verification was performed.
C. A backup is the source of Malware or illicit information.
D. A backup is unavailable duringdisaster recovery.
Answer: A

QUESTION 9:
A new wireless client is configured to join a 802.11 network. Thisclient uses the
same hardware and software as many of the other clients on the network. The
client can see the network, but cannot connect. A wireless packet sniffer shows
that the Wireless Access Point (WAP) is not responding to the association
requests being sent by the wireless client. What is a possible source of this
problem?

A. The client cannot see the SSID of the wireless network


B. The wireless client is not configured to use DHCP
C. The WAP does not recognize the client's MAC address
D. Client isconfigured for the wrong channel
Answer: C

QUESTION 10:
What does a firewall check to prevent particular ports and applications from
getting packets into an organization?
A. Transport layer port numbers and application layer headers
B. Network layer headers and the session layer port numbers
C. Application layer port numbers and the transport layer headers
D. Presentation layer headers and the session layer port numbers
Answer: A

Buy Complete Questions Answers File from


PDF Version + Test Engine Software Version
90 Days Free Updates Service
Valid for All Countries

http://www.pass4suredumps.in/312-50v9.html

You might also like