PrepAway - Latest Free Exam Questions & Answers

Tag: 312-50

If Heather is caught by the federal government, what law could she be prosecuted under?

Heather is a hackivist working for Green Peace International.She has broken into numerous oil and energy companies and exposed their confidential data to the public. Normally, Heather uses a combination of social engineering and DoS techniques to gain access to the companies’ networks.Heather has made over 50 fakes ID cards and access badges to gain unauthorized access to companies to gain information as well. If Heather is caught by the federal government, what law could she be prosecuted under?

Yancy is a network security administrator for a large electric company. This company provides power for over 1

Yancy is a network security administrator for a large electric company. This company provides power for over 100,000 people in Las Vegas. Yancey has worked for his company for over 15 years and has become very successful. One day, Yancey comes in to work and finds out that the company will be downsizing and he will be out of a job in two weeks. Yancey is very angry and devides to place logic bombs, viruses, Trojans, and backdoors all over the network to take down the company once he has left. Yancey does not care if his actions land him in jail for 30 or more years, he just wants the company to pay for what they are doing to him. What would Yancey be considered.

What in particular is Jason's company concerned about?

Jason is the network security administrator for Genderson International, a global shipping company based out of New York City. Jason’s company utilizes many layers of security throughout its network such as network firewalls, application firewalls, vlans, operating system hardening, and so on. One thing in particular the company is concerned with the trustworthiness of data and resources in term of preventing improper and unauthorized changes. Since the company is global, information is sent constantly back and forth to all its employees all over the world. What in particular is Jason’s company concerned about?

What kind of penetration test would you recommend that would best address the client's concern?

A client has approached you with a penetration test requirements. They are concerned with the possibility of external threat, and have invested considerable resources in protecting their Internet exposure. However, their main concern is the possibility of an employee elevating his/her privileges and gaining access to information outside of their respective department. What kind of penetration test would you recommend that would best address the client’s concern?

What would you call this kind of activity?

Joel and her team have been going through tons of garbage, recycled paper, and other rubbish in order to find some information about the target they are attempting to penetrate. What would you call this kind of activity?

_____ is a type of symmetric-key encryption algorithm that transforms a fixed-length block of plaintext (unenc

_____ is a type of symmetric-key encryption algorithm that transforms a fixed-length block of plaintext (unencrypted text) data into a block of ciphertext (encrypted text) data of the same length.


Page 13 of 150« First...1112131415...203040...Last »