Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
312-50v11
Free trial
Verified
Question 76
Which of the following information security controls creates an appealing isolated environment for hackers to prevent them from compromising critical targets while simultaneously gathering information about the hacker?
- A: Botnet
- B: Intrusion detection system
- C: Firewall
- D: Honeypot
Question 77
Jim, a professional hacker, targeted an organization that is operating critical industrial infrastructure. Jim used Nmap to scan open ports and running services on systems connected to the organization's OT network. He used an Nmap command to identify Ethernet/IP devices connected to the Internet and further gathered information such as the vendor name, product code and name, device name, and IP address.
Which of the following Nmap commands helped Jim retrieve the required information?
- A: nmap -Pn -sT --scan-delay 1s --max-parallelism 1 -p < Port List > < Target IP >
- B: nmap -Pn -sU -p 44818 --script enip-info < Target IP >
- C: nmap -Pn -sT -p 46824 < Target IP >
- D: nmap -Pn -sT -p 102 --script s7-info < Target IP >
Question 78
In this form of encryption algorithm, every individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?
- A: IDEA
- B: Triple Data Encryption Standard
- C: AES
- D: MD5 encryption algorithm
Question 79
An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up.
What is the most likely cause?
- A: The network devices are not all synchronized.
- B: Proper chain of custody was not observed while collecting the logs.
- C: The attacker altered or erased events from the logs.
- D: The security breach was a false positive.
Question 80
Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating that the port is closed.
What is the port scanning technique used by Sam to discover open ports?
- A: Xmas scan
- B: IDLE/IPID header scan
- C: TCP Maimon scan
- D: ACK flag probe scan
That’s the end of your free questions
You’ve reached the preview limit for 312-50v11Consider upgrading to gain full access!
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!