Get Full Version of the Exam
http://www.EnsurePass.com/712-50.html
Question No.251
SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:
A. ` o 1=1 – –
B. /../../../../
-
quot;DROPTABLE USERNAMEquot;
-
NOPS
Correct Answer: A
Question No.252
An anonymity network is a series of?
-
Covert government networks
-
War driving maps
-
Government networks in Tora
-
Virtual network tunnels
Correct Answer: D
Question No.253
Network Forensics is the prerequisite for any successful legal action after attacks on your Enterprise Network. Which is the single most important factor to introducing digital evidence into a court of law?
-
Comprehensive Log-Files from all servers and network devices affected during the attack
-
Fully trained network forensic experts to analyze all data right after the attack
-
Uninterrupted Chain of Custody
-
Expert forensics witness
Correct Answer: C
Question No.254
Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?
-
Trusted and untrusted networks
-
Type of authentication
-
Storage encryption
-
Log retention
Correct Answer: A
Question No.255
In terms of supporting a forensic investigation, it is now imperative that managers, first- responders, etc., accomplish the following actions to the computer under investigation:
-
Secure the area and shut-down the computer until investigators arrive
-
Secure the area and attempt to maintain power until investigators arrive
-
Immediately place hard drive and other components in an anti-static bag
-
Secure the area.
Correct Answer: B
Question No.256
Which wireless encryption technology makes use of temporal keys?
-
Wireless Application Protocol (WAP)
-
Wifi Protected Access version 2 (WPA2)
-
Wireless Equivalence Protocol (WEP)
-
Extensible Authentication Protocol (EAP)
Correct Answer: B
Question No.257
An access point (AP) is discovered using Wireless Equivalent Protocol (WEP). The ciphertext sent by the AP is encrypted with the same key and cipher used by its stations. What authentication method is being used?
-
Shared key
-
Asynchronous
-
Open
-
None
Correct Answer: A
Question No.258
The general ledger setup function in an enterprise resource package allows for setting accounting periods. Access to this function has been permitted to users in finance, the shipping department, and production scheduling. What is the most likely reason for such broad access?
-
The need to change accounting periods on a regular basis.
-
The requirement to post entries for a closed accounting period.
-
The need to create and modify the chart of accounts and its allocations.
-
The lack of policies and procedures for the proper segregation of duties.
Correct Answer: D
Question No.259
Which of the following is a symmetric encryption algorithm?
-
3DES
-
MD5
-
ECC
-
RSA
Correct Answer: A
Question No.260
Security related breaches are assessed and contained through which of the following?
-
The IT support team.
-
A forensic analysis.
-
Incident response
-
Physical security team.
Correct Answer: C
Get Full Version of the Exam
712-50 Dumps
712-50 VCE and PDF