312-50v9 Dumps 312-50v9 Exam Questions 312-50v9 New Questions 312-50v9 PDF 312-50v9 VCE EC-Council

[February 2018] Lead2pass Provides Free 312-50v9 Exam Dumps PDF 614q

Lead2pass Provides Latest Exam 312-50v9 Dumps VCE For Free Downloading:

https://www.lead2pass.com/312-50v9.html

QUESTION 21
A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server.
Based on this information, what should be one of your key recommendations to the bank?

A.    Place a front-end web server in a demilitarized zone that only handles external web traffic
B.    Require all employees to change their passwords immediately
C.    Move the financial data to another server on the same IP subnet
D.    Issue new certificates to the web servers from the root certificate authority

Answer: A
Explanation:
A DMZ or demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organization’s external-facing services to a larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization’s local area network (LAN); an external network node only has direct access to equipment in the DMZ, rather than any other part of the network.
https://en.wikipedia.org/wiki/DMZ_(computing)

QUESTION 22
Port scanning can be used as part of a technical assessment to determine network vulnerabilities. The TCP XMAS scan is used to identify listening ports on the targeted system.
If a scanned port is open, what happens?

A.    The port will ignore the packets.
B.    The port will send an RST.
C.    The port will send an ACK.
D.    The port will send a SYN.

Answer: A
Explanation:
An attacker uses a TCP XMAS scan to determine if ports are closed on the target machine. This scan type is accomplished by sending TCP segments with the all flags sent in the packet header, generating packets that are illegal based on RFC 793. The RFC 793 expected behavior is that any TCP segment with an out- of-state Flag sent to an open port is discarded, whereas segments with out-of-state flags sent to closed ports should be handled with a RST in response. This behavior should allow an attacker to scan for closed ports by sending certain types of rule-breaking packets (out of sync or disallowed by the TCB) and detect closed ports via RST packets.
https://capec.mitre.org/data/definitions/303.html

QUESTION 23
During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a Demilitarized Zone (DMZ) and a second DNS server on the internal network.
What is this type of DNS configuration commonly called?

A.    Split DNS
B.    DNSSEC
C.    DynDNS
D.    DNS Scheme

Answer: A
Explanation:
In a split DNS infrastructure, you create two zones for the same domain, one to be used by the internal network, the other used by the external network. Split DNS directs internal hosts to an internal domain name server for name resolution and external hosts are directed to an external domain name server for name resolution.
http://www.webopedia.com/TERM/S/split_DNS.html

QUESTION 24
This tool is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools.
Which of the following tools is being described?

A.    Aircrack-ng
B.    Airguard
C.    WLAN-crack
D.    wificracker

Answer: A
Explanation:
Aircrack-ng is a complete suite of tools to assess WiFi network security.
The default cracking method of Aircrack-ng is PTW, but Aircrack-ng can also use the FMS/KoreK method, which incorporates various statistical attacks to discover the WEP key and uses these in combination with brute forcing.
http://www.aircrack-ng.org/doku.php?id=aircrack-ng

QUESTION 25
The Heartbleed bug was discovered in 2014 and is widely referred to under MITRE’s Common Vulnerabilities and Exposures (CVE) as CVE-2014-0160. This bug affects the OpenSSL implementation of the transport layer security (TLS) protocols defined in RFC6520.
What type of key does this bug leave exposed to the Internet making exploitation of any compromised system very easy?

A.    Private
B.    Public
C.    Shared
D.    Root

Answer: A
Explanation:
The data obtained by a Heartbleed attack may include unencrypted exchanges between TLS parties likely to be confidential, including any form post data in users’ requests. Moreover, the confidential data exposed could include authentication secrets such as session cookies and passwords, which might allow attackers to impersonate a user of the service.
An attack may also reveal private keys of compromised parties.
https://en.wikipedia.org/wiki/Heartbleed

QUESTION 26
In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.
Which Algorithm is this referring to?

A.    Wired Equivalent Privacy (WEP)
B.    Wi-Fi Protected Access (WPA)
C.    Wi-Fi Protected Access 2 (WPA2)
D.    Temporal Key Integrity Protocol (TKIP)

Answer: A
Explanation:
WEP is the currently most used protocol for securing 802.11 networks, also called wireless lans or wlans. In 2007, a new attack on WEP, the PTW attack, was discovered, which allows an attacker to recover the secret key in less than 60 seconds in some cases.
Note: Wardriving is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or personal digital assistant (PDA).
https://events.ccc.de/camp/2007/Fahrplan/events/1943.en.html

QUESTION 27
Which of the following is considered an acceptable option when managing a risk?

A.    Reject the risk.
B.    Deny the risk.
C.    Mitigate the risk.
D.    Initiate the risk.

Answer: C

QUESTION 28
Which security control role does encryption meet?

A.    Preventative
B.    Detective
C.    Offensive
D.    Defensive

Answer: A

QUESTION 29
Which type of access control is used on a router or firewall to limit network activity?

A.    Mandatory
B.    Discretionary
C.    Rule-based
D.    Role-based

Answer: C

QUESTION 30
At a Windows Server command prompt, which command could be used to list the running services?

A.    Sc query type= running
B.    Sc query \\servername
C.    Sc query
D.    Sc config

Answer: C

312-50v9 dumps full version (PDF&VCE): https://www.lead2pass.com/312-50v9.html

Large amount of free 312-50v9 exam questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDTVZJRHRvblhycms

You may also need:

312-49v9 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDSWJCNkFjOEx1Yms