High value 312-50v9 Exam Questions 2021

Act now and download your 312 50v9 pdf today! Do not waste time for the worthless 312 50v9 pdf tutorials. Download 312 50v9 pdf with real questions and answers and begin to learn 312 50v9 pdf with a classic professional.

Also have 312-50v9 free dumps questions for you:

NEW QUESTION 1
An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to www.MyPersonalBank.com, that the user is directed to a phishing site.
Which file does the attacker needto modify?

  • A. Hosts
  • B. Networks
  • C. Boot.ini
  • D. Sudoers

Answer: A

NEW QUESTION 2
The network administrator contacts you and tells you that she noticed the temperature on the internal wireless router increases by more than 20% during weekend hours when the office was closed. She asks you to investigate the issue because she is busy dealing with a big conference and she doesn’t have time to perform the task.
What tool can you use to view the network traffic being sent and received by the wireless router?

  • A. Netcat
  • B. Wireshark
  • C. Nessus
  • D. Netstat

Answer: B

NEW QUESTION 3
You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly.
What is the best nmap command you will use?

  • A. Nmap –T4 –F 10.10.0.0/24
  • B. Nmap –T4 –q 10.10.0.0/24
  • C. Nmap –T4 –O 10.10.0.0/24
  • D. Nmap –T4 –r 10.10.0.0/24

Answer: A

NEW QUESTION 4
You are performing information gathering for an important penetration test. You have found pdf, doc, and images in your objective. You decide to extract metadata from these files and analyze it.
What tool will help you with the task?

  • A. Armitage
  • B. Dimitry
  • C. cdpsnarf
  • D. Metagoofil

Answer: D

NEW QUESTION 5
When you are getting informationabout a web server, it is very important to know the HTTP Methods (GET, POST, HEAD, PUT, DELETE, TRACE) that are available because there are two critical methods (PUT and DELETE). PUT can upload a file to the server and DELETE can delete a file from the server. You can detect all these methods (GET, POST, HEAD, PUT, DELETE, TRACE) using NMAP script engine.
What nmap script will help you with this task?

  • A. http enum
  • B. http-git
  • C. http-headers
  • D. http-methods

Answer: B

NEW QUESTION 6
A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing inconcluding the Operating System (OS) version installed. Considering the NMAP result below, which of the follow is likely to be installed on the target machine by the OS? Starting NMAP 5.21 at 2011-03-15 11:06 NMAP scan report
for 172.16.40.65 Host is up (1.00s latency). Not shown: 993 closed ports PORT STATE SERVICE 21/tcp open ftp 23/tcp open telnet 80 /tcp open http 139/tcp open netbios-ssn 515/tcp open 631/tec open ipp 9100/tcp open MAC Address: 00:00:48:0D:EE:8

  • A. The host is likely a printer.
  • B. The host is likely a router.
  • C. The host is likely a Linux machine.
  • D. The host is likely a Windows machine.

Answer: A

NEW QUESTION 7
An Internet Service Provider (ISP) has a need to authenticate users connecting using analog modems, digital Subscriber Line (DSL), wireless data services, and virtual Private Networks (VPN) over a Frame Relay network.
Which AAA protocol is most likely able to handle this requirement?

  • A. DIAMETER
  • B. Kerberos
  • C. RADIUS
  • D. TACACS+

Answer: D

NEW QUESTION 8
The chance of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from the last backup to the new hard disk. The recovery person earns $10/hour. Calculate theSLE, ARO, and ALE. Assume the EF = 1 (100%).
What is the closest approximate cost of this replacement and recovery operation per year?

  • A. $100
  • B. $146
  • C. 440
  • D. 1320

Answer: B

NEW QUESTION 9
You just set up a security system in your network. In what kind of system would you find thefollowing string of characters used as a rule within its configuration?
alert tcp any any ->192.168.100.0/24 21 (msg: "FTP on the network!";)

  • A. A firewall IPTable
  • B. A Router IPTable
  • C. An Intrusion Detection System
  • D. FTP Server rule

Answer: C

NEW QUESTION 10
You are logged in as a local admin on a Windows 7 system and you need to launch the Computer Management Console from command line.
Which command would you use?

  • A. c:services.msc
  • B. c:ncpa.cp
  • C. c:compmgmt.msc
  • D. c:gpedit

Answer: C

NEW QUESTION 11
In Risk Management, how is the term “likelihood” related to the concept of “threat?”

  • A. Likelihood is the probability that a vulnerability is a threat-source.
  • B. Likelihood is a possible threat-source that may exploit a vulnerability.
  • C. Likelihood is the likely source of a threat that could exploit a vulnerability.
  • D. Likelihood is the probability that a threat-source will exploit a vulnerability.

Answer: D

NEW QUESTION 12
Which of the following is the successor of SSL?

  • A. RSA
  • B. GRE
  • C. TLS
  • D. IPSec

Answer: C

NEW QUESTION 13
During a blackbox pen test you attempt to pass IRC traffic over post 80/TCP from a compromised web enabled host. The traffic gets blocked; however outbound HTTP traffic is unimpeded.
What type of firewall is inspecting outbound traffic?

  • A. Circuit
  • B. Packet Filtering
  • C. Application
  • D. Stateful

Answer: C

NEW QUESTION 14
Which of the following incident handling process phases is responsible for defining rules, creating a back-up plan, and testing the plans for an enterprise?

  • A. Preparation phase
  • B. Recovery phase
  • C. Identification phase
  • D. Containment phase

Answer: A

NEW QUESTION 15
Which of the following describes the characteristics of a Boot Sector Virus?

  • A. Overwrites the original MBR and only executes the new virus code
  • B. Modifies directory table entries so that directory entries point to the virus code instead of the actual program
  • C. Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR
  • D. Moves the MBR to another location on the RAM and copies itself to the original location of the MBR

Answer: C

NEW QUESTION 16
Nation-state threat actors often discover vulnerabilitiesand hold on to them until they want to launch a sophisticated attack. The Stuxnet attack was an unprecedented style of attack because it used four types of this vulnerability.
What is this style of attack called?

  • A. zero-hour
  • B. no-day
  • C. zero-day
  • D. zero-sum

Answer: C

NEW QUESTION 17
How does the Address Resolution Protocol (ARP) work?

  • A. It sends a reply packet for a specific IP, asking for the MAC address.
  • B. It sends a reply packet to all the network elements, asking for the MAC address from a specific IP.
  • C. It sends a request packet to all the network elements, asking for the domainname from a specific IP.
  • D. It sends a request packet to all the network elements, asking for the MAC address from a specific IP.

Answer: D

100% Valid and Newest Version 312-50v9 Questions & Answers shared by Certleader, Get Full Dumps HERE: https://www.certleader.com/312-50v9-dumps.html (New 125 Q&As)