PrepAway - Latest Free Exam Questions & Answers

Tag: 312-50

Which one of the following statements is most probably true?

You are having trouble obtaining accurate results while conducting a port scan against a target network. You check for the presence of any security devices between you and the target system. When both stealth and connect scans do not work, you decide to perform a NULL scan with NMAP. The first few systems scanned shows all ports open. Which one of the following statements is most probably true?

What tool would work best for Daryl's needs?

Daryl is a network administrator working for Dayton Technologies. Since Daryl’s background is in web application development, many of the programs and applications his company uses are web- based. Daryl sets up a simple forms-based logon screen for all the applications he creates, so they are secure.
The problem Daryl is having, is that his users are forgetting their passwords quite often and sometimes he does not have the time to get into his applications and change the passwords for them. Daryl wants a tool or program that can monitor web-based passwords and notify him when a password has been changed so he can use that tool whenever a user calls him and he can give them their password right then.
What tool would work best for Daryl’s needs?

What would Steven be considered?

Steven works as a security consultant and frequently performs penetration tests for Fortune 500 companies.Steven runs external and internal tests and then creates reports to show the companies where their weak areas are.Steven always signs a non-disclosure agreement before performing his tests.What would Steven be considered?

The FIN flag is set and sent from host A to host B when host A has no more data to transmit (Closing a TCP con

The FIN flag is set and sent from host A to host B when host A has no more data to transmit (Closing a TCP connection). This flag releases the connection resources. However, host A can continue to receive data as long as the SYN sequence numbers of transmitted packets from host B are lower than the packet segment containing the set FIN flag.

What utility could you use to examine the TCP dump file closer and make it more readable?

You are the senior security analyst for Hammerstreet Inc. located in Florida. Hammerstreet’s primary product line revolves around high tech weapons developed for the US Army. For this reason, your position as the head of logical security is vital in ensuring that no corporate secrets are leaked. You are in the process of purchasing an IPS device for the network, so currently you only have an older IDS appliance sitting on the network.
On Monday morning when you get into work, you are alerted by your IDS that an outside IP is scanning numerous ports on your network. You are then alerted by the IDS that it is getting flooded by malformed packets to some commonly used ports such as ports 80, 135, 445, and 53. You logon to the IDS’ management console and run TCP dump to a text file for a time range of 10 minutes. You open the file initially but it is very difficult to read. You eed a utility that can group all the TCP packets in the file by their timestamps, to get a closer look at how much data is being sent to your network in a given amount of time.
What utility could you use to examine the TCP dump file closer and make it more readable?

Which of the following represents the initial two commands that an IRC client sends to join an IRC network?

Which of the following represents the initial two commands that an IRC client sends to join an IRC network?

What technique does Jimmy use to compromise a database?

Jimmy, an attacker, knows that he can take advantage of poorly designed input validation routines to create or alter SQL commands to gain access to private data or execute commands in the database. What technique does Jimmy use to compromise a database?


Page 41 of 150« First...102030...3940414243...506070...Last »