PrepAway - Latest Free Exam Questions & Answers

Tag: 312-50

What will this command accomplish for Sydney?

Sydney is a certified ethical hacker working as the systems administrator for Galt Riderson International. Sydney is an expert in Linux systems and is utilizing IPTables to protect Linux clients as well as servers. After monitoring the firewall log files, Sydney has been fine tuning the firewall on many clients to adjust for the best security. Sydney types in the following command:
iptables -A INPUT -s 0/0 -I eth1 -d 192.168.254.121 -p TCP -j ACCEPT
What will this command accomplish for Sydney?

What is Jacob recommending the offices install for added security?

Jacob is the IT manager for Thompson & Sons, a bail bondsman company in Minneapolis. Jacob has been told by the company’s president to perform a logical and physical security audit for all the offices around the city. Jacob finds thata number of offices need more physical security. Jacob recommends that these offices add a cage that customers must pass through before entering the main office. This cage will allow employees in the office to verify the customer’s information before allowing them access into the building. What is Jacob recommending the offices install for added security?

What does this symbol signify?

Oliver is the network security administrator for Foodies Café, a chain of coffee shops in the Seattle metropolitan area. Oliver is performing his quarterlysecurity audit of the entire company, including each coffee shop the company owns. Each café has a wireless hotspot that customers can utilize. The home office also has a wireless network which is used by employees. While walking aroundthe outside of the corporate office, Oliver sees a drawing on the sidewalk right next to his building.
What does this symbol signify?

With this error checking, what will be the resulting speed of the wireless networks?

David is the wireless security administrator for Simpson Audio Visual. Davi d was hired on after the company was awarded a contract with 100 airports to install wireless networks. Since these networks will be used by both internal airport employees and visitors to the airports, David decided to go with the de facto standard of 802.11b. Every airport wants to use 802.11b with TCP error checking, even though David has said this will slow down the wireless network connection speeds. With this error checking, what will be the resulting speed of the wireless networks?

What can Daryl deduce from this error message?

Daryl is the network administrator for the North Carolina Lottery. Daryl is responsible for all network security as well as physical security. The lotteryrecently hired on a web developer to create their website and bring all services in house since the lottery’s website was previously hosted and supported by athird party company. After the developer creates the website, Daryl wants to check it to ensure it is as secure as possible. The developer created a logon page for lottery retailers to gain access to their financial information. Withoutknowing what any of the usernames and passwords are, Daryl tries to bypass the logon page and gain access to the backend. Daryl makes a number of attempts and he gets the following error message every time.
What can Daryl deduce from this error message?

What command did James type in to get this window to come up?

James is an IT security consultant as well as a certified ethical hacker. James has been asked to audit the network security of Yerta Manufacturing, a toolmanufacturing company in Phoenix. James performs some initial external tests and then begins testing the security from inside the company’s network. James finds some big problems right away; a number of users that are working on WindowsXP computers have saved their usernames and passwords used to connect to serverson the network. This way, those users do not have to type in their credentialsevery time they want access to a server. James tells the IT manager of Yerta Manufacturing about this, and the manager does not believe this is possible on Windows XP. To prove his point, James has a user logon to a computer and then James types in a command that brings up a window that says “Stored User Names and Passwords”. What command did James type in to get this window to come up?

What tool is Cheryl using to monitor the company’s external websites?

Cheryl is a security analyst working for Shintel Enterprises, a publishing company in Boston. As well as monitoring the security state of the company’s network, she must ensure that the company’s external websites are up and running all the time. Cheryl performs some quick searches online and finds a utility thatwill display a window on her desktop showing the current uptime statistics of the websites she needs to watch. This tool works by periodically pinging the websites; showing the ping time as well as a small graph that allows Cheryl to viewthe recent monitoring history. What tool is Cheryl using to monitor the company’s external websites?

What will this code do on the employee’s computer once the email is opened?

Leonard is the senior security analyst for his company, Meyerson Incorporated. Leonard has recently finished writing security policies for the company thathave just been signed off by management. Every employee has had to sign off onthe policies, agreeing to abide by them or face disciplinary action. One policy in particular is being enforced; employees are not allowed to use web-based email clients such as Hotmail, Yahoo, and Gmail. This has been put in place because of virus infections that started with web-based email. While walking throughthe office one day, Leonard notices an employee using Hotmail. To prove a point, Leonard sends an email to this users Hotmail account with the following code.
What will this code do on the employee’s computer once the email is opened?


Page 10 of 150« First...89101112...203040...Last »