[2017 Newest] Ensure Pass 312-50v9 Exam With Lead2pass New 312-50v9 Brain Dumps (141-160)

Lead2pass 2017 September New EC-Council 312-50v9 Exam Dumps!

100% Free Download! 100% Pass Guaranteed!

Good news, Lead2pass has updated the 312-50v9 exam dumps. With all the questions and answers in your hands, you will pass the EC-Council 312-50v9 exam easily.

Following questions and answers are all new published by EC-Council Official Exam Center: https://www.lead2pass.com/312-50v9.html

QUESTION 141
The intrusion detection system at a software development company suddenly generates multiple alerts regarding attacks against the company’s external webserver, VPN concentrator, and DNS servers. What should the security team do to determine which alerts to check first?

A.    Investigate based on the maintenance schedule of the affected systems.
B.    Investigate based on the service level agreements of the systems.
C.    Investigate based on the potential effect of the incident.
D.    Investigate based on the order that the alerts arrived in.

Answer: C

QUESTION 142
An IT security engineer notices that the company’s web server is currently being hacked. What should the engineer do next?

A.    Unplug the network connection on the company’s web server.
B.    Determine the origin of the attack and launch a counterattack.
C.    Record as much information as possible from the attack.
D.    Perform a system restart on the company’s web server.

Answer: C

QUESTION 143
Which of the following is a primary service of the U.S. Computer Security Incident Response Team (CSIRT)?

A.    CSIRT provides an incident response service to enable a reliable and trusted single point of contact for reporting computer security incidents worldwide.
B.    CSIRT provides a computer security surveillance service to supply a government with important intelligence information on individuals travelling abroad.
C.    CSIRT provides a penetration testing service to support exception reporting on incidents worldwide by individuals and multi-national corporations.
D.    CSIRT provides a vulnerability assessment service to assist law enforcement agencies with profiling an individual’s property or company’s asset.

Answer: A

QUESTION 144
Which of the following items is unique to the N-tier architecture method of designing software applications?

A.    Application layers can be separated, allowing each layer to be upgraded independently from other layers.
B.    It is compatible with various databases including Access, Oracle, and SQL.
C.    Data security is tied into each layer and must be updated for all layers when any upgrade is performed.
D.    Application layers can be written in C, ASP.NET, or Delphi without any performance loss.

Answer: A

QUESTION 145
If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which other option could the tester use to get a response from a host using TCP?

A.    Hping
B.    Traceroute
C.    TCP ping
D.    Broadcast ping

Answer: A

QUESTION 146
Which of the following descriptions is true about a static NAT?

A.    A static NAT uses a many-to-many mapping.
B.    A static NAT uses a one-to-many mapping.
C.    A static NAT uses a many-to-one mapping.
D.    A static NAT uses a one-to-one mapping.

Answer: D

QUESTION 147
Which of the following network attacks takes advantage of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?

A.    Teardrop
B.    SYN flood
C.    Smurf attack
D.    Ping of death

Answer: A

QUESTION 148
Employees in a company are no longer able to access Internet web sites on their computers. The network administrator is able to successfully ping IP address of web servers on the Internet and is able to open web sites by using an IP address in place of the URL. The administrator runs the nslookup command for www.eccouncil.org and receives an error message stating there is no response from the server. What should the administrator do next?

A.    Configure the firewall to allow traffic on TCP ports 53 and UDP port 53.
B.    Configure the firewall to allow traffic on TCP ports 80 and UDP port 443.
C.    Configure the firewall to allow traffic on TCP port 53.
D.    Configure the firewall to allow traffic on TCP port 8080.

Answer: A

QUESTION 149
While testing the company’s web applications, a tester attempts to insert the following test script into the search area on the company’s web site:

<script>alert(” Testing Testing Testing “)</script>

Afterwards, when the tester presses the search button, a pop-up box appears on the screen with the text:

“Testing Testing Testing”.

Which vulnerability has been detected in the web application?

A.    Buffer overflow
B.    Cross-site request forgery
C.    Distributed denial of service
D.    Cross-site scripting

Answer: D
Explanation:

QUESTION 150
Which of the following is an advantage of utilizing security testing methodologies to conduct a security audit?

A.    They provide a repeatable framework.
B.    Anyone can run the command line scripts.
C.    They are available at low cost.
D.    They are subject to government regulation.

Answer: A

QUESTION 151
The Open Web Application Security Project (OWASP) testing methodology addresses the need to secure web applications by providing which one of the following services?

A.    An extensible security framework named COBIT
B.    A list of flaws and how to fix them
C.    Web application patches
D.    A security certification for hardened web applications

Answer: B

QUESTION 152
In the OSI model, where does PPTP encryption take place?

A.    Transport layer
B.    Application layer
C.    Data link layer
D.    Network layer

Answer: C

QUESTION 153
Which of the following is an example of IP spoofing?

A.    SQL injections
B.    Man-in-the-middle
C.    Cross-site scripting
D.    ARP poisoning

Answer: B

QUESTION 154
For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with which key?

A.    Sender’s public key
B.    Receiver’s private key
C.    Receiver’s public key
D.    Sender’s private key

Answer: D

QUESTION 155
Some passwords are stored using specialized encryption algorithms known as hashes. Why is this an appropriate method?

A.    It is impossible to crack hashed user passwords unless the key used to encrypt them is obtained.
B.    If a user forgets the password, it can be easily retrieved using the hash key stored by administrators.
C.    Hashing is faster compared to more traditional encryption algorithms.
D.    Passwords stored using hashes are non-reversible, making finding the password much more difficult.

Answer: D

QUESTION 156
Company A and Company B have just merged and each has its own Public Key Infrastructure (PKI). What must the Certificate Authorities (CAs) establish so that the private PKIs for Company A and Company B trust one another and each private PKI can validate digital certificates from the other company?

A.    Poly key exchange
B.    Cross certification
C.    Poly key reference
D.    Cross-site exchange

Answer: B

QUESTION 157
Which of the following defines the role of a root Certificate Authority (CA) in a Public Key Infrastructure (PKI)?

A.    The root CA is the recovery agent used to encrypt data when a user’s certificate is lost.
B.    The root CA stores the user’s hash value for safekeeping.
C.    The CA is the trusted root that issues certificates.
D.    The root CA is used to encrypt email messages to prevent unintended disclosure of data.

Answer: C

QUESTION 158
A network security administrator is worried about potential man-in-the-middle attacks when users access a corporate web site from their workstations. Which of the following is the best remediation against this type of attack?

A.    Implementing server-side PKI certificates for all connections
B.    Mandating only client-side PKI certificates for all connections
C.    Requiring client and server PKI certificates for all connections
D.    Requiring strong authentication for all DNS queries

Answer: C

QUESTION 159
Which of the following levels of algorithms does Public Key Infrastructure (PKI) use?

A.    RSA 1024 bit strength
B.    AES 1024 bit strength
C.    RSA 512 bit strength
D.    AES 512 bit strength

Answer: A

QUESTION 160
Which of the following is a characteristic of Public Key Infrastructure (PKI)?

A.    Public-key cryptosystems are faster than symmetric-key cryptosystems.
B.    Public-key cryptosystems distribute public-keys within digital signatures.
C.    Public-key cryptosystems do not require a secure key distribution channel.
D.    Public-key cryptosystems do not provide technical non-repudiation via digital signatures.

Answer: B

More free Lead2pass 312-50v9 exam new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDTVZJRHRvblhycms

Once there are some changes on 312-50v9 exam questions, we will update the study materials timely to make sure that our customer can download the latest edition.

2017 EC-Council 312-50v9 (All 589 Q&As) exam dumps (PDF&VCE) from Lead2pass:

https://www.lead2pass.com/312-50v9.html [100% Exam Pass Guaranteed]