Thursday, December 24, 2020

Pass Eccouncil 312-50v10 Exam with 100% Passing Assurance | Realexamdumps.com


 Question #:1


What type of OS fingerprinting technique sends specially crafted packets to the remote OS and analyzes the

received response?


A. Passive

B.Reflective

C. Active

D. Distributive


Answer: C


Question #:2


Which command line switch would be used in NMAP to perform operating system detection?


A. -OS

B. -sO

C. -sP

D. -O


Answer: D


Question #:3


International Organization for Standardization (ISO) standard 27002 provides guidance for compliance by

outlining


A. guidelines and practices for security controls.

B.  financial soundness and business viability metrics.

C. standard best practice for configuration management.

D. contract agreement writing standards.


Answer: A


Question #:4


Which of the following is an example of IP spoofing?


A. SQL injections

B. Man-in-the-middle

C. Cross-site scripting

D. ARP poisoning


Answer: B


Question #:5


Which of the following is assured by the use of a hash?


A. Integrity

B. Confidentiality

C. Authentication

D. Availability


Answer: A


Explanation


An important application of secure hashes is verification of message integrity. Determining whether any

changes have been made to a message (or a file), for example, can be accomplished by comparing message

digests calculated before, and after, transmission (or any other event).


References:

https://en.wikipedia.org/wiki/Cryptographic_hash_function#Verifying_the_integrity_of_files_or_messages


No comments:

Post a Comment