Get Full Version of the Exam
http://www.EnsurePass.com/712-50.html
Question No.261
What is the term describing the act of inspecting all real-time Internet traffic (i.e., packets) traversing a major Internet backbone without introducing any apparent latency?
-
Traffic Analysis
-
Deep-Packet inspection
-
Packet sampling
-
Heuristic analysis
Correct Answer: B
Question No.262
The process of identifying and classifying assets is typically included in the
-
Threat analysis process
-
Asset configuration management process
-
Business Impact Analysis
-
Disaster Recovery plan
Correct Answer: C
Question No.263
As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.
-
Covering tracks
-
Scanning and enumeration
-
Maintaining Access
-
Reconnaissance
-
Gaining Access
A. 4, 2, 5, 3, 1
B. 2, 5, 3, 1, 4
C. 4, 5, 2, 3, 1
D. 4, 3, 5, 2, 1
Correct Answer: A
Question No.264
Which of the following statements about Encapsulating Security Payload (ESP) is true?
-
It is an IPSec protocol.
-
It is a text-based communication protocol.
-
It uses TCP port 22 as the default port and operates at the application layer.
-
It uses UDP port 22
Correct Answer: A
Question No.265
A customer of a bank has placed a dispute on a payment for a credit card account. The banking system uses digital signatures to safeguard the integrity of their transactions. The bank claims that the system shows proof that the customer in fact made the payment. What is this system capability commonly known as?
-
non-repudiation
-
conflict resolution
-
strong authentication
-
digital rights management
Correct Answer: A
Question No.266
Which of the following is the MAIN security concern for public cloud computing?
-
Unable to control physical access to the servers
-
Unable to track log on activity
-
Unable to run anti-virus scans
-
Unable to patch systems as needed
Correct Answer: A
Question No.267
Physical security measures typically include which of the following components?
-
Physical, Technical, Operational
-
Technical, Strong Password, Operational
-
Operational, Biometric, Physical
-
Strong password, Biometric, Common Access Card
Correct Answer: A
Question No.268
You are having a penetration test done on your company network and the leader of the team says they discovered all the network devices because no one had changed the Simple Network Management Protocol (SNMP) community strings from the defaults. Which of the following is a default community string?
-
Execute
-
Read
-
Administrator
-
Public
Correct Answer: D
Question No.269
Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?
-
In-line hardware keyloggers don#39;t require physical access
-
In-line hardware keyloggers don#39;t comply to industry regulations
-
In-line hardware keyloggers are undetectable by software
-
In-line hardware keyloggers are relatively inexpensive
Correct Answer: C
Question No.270
What type of attack requires the least amount of technical equipment and has the highest success rate?
-
War driving
-
Operating system attacks
-
Social engineering
-
Shrink wrap attack
Correct Answer: C
Get Full Version of the Exam
712-50 Dumps
712-50 VCE and PDF