This page was exported from Free Lead2pass Dumps VCE [ http://www.freepassit4sure.com ] Export date:Tue Sep 25 13:07:46 2018 / +0000 GMT ___________________________________________________ Title: [Full Version] Lead2pass Offers Free 312-50v9 Dumps Files for Free Downloading By 312-50v9 Exam Expert (1-15) --------------------------------------------------- 2017 March EC-Council Official New Released 312-50v9 Dumps in Lead2pass.com! 100% Free Download! 100% Pass Guaranteed! How to pass 312-50v9 exam easily? Are you struggling for the 312-50v9 exam? Good news, Lead2pass EC-Council technical experts have collected all the questions and answers which are updated to cover the knowledge points and enhance candidates' abilities. We offer the latest 312-50v9 PDF and VCE dumps with new version VCE player for free download, and the new 312-50v9 dump ensures your 312-50v9 exam 100% pass. Following questions and answers are all new published by EC-Council Official Exam Center: http://www.lead2pass.com/312-50v9.html QUESTION 1You have successfully comprised a server having an IP address of 10.10.0.5.You would like to enumerate all machines in the same network quickly.What is the best nmap command you will use? A.    nmap -T4 -F 10.10.0.0/24B.    nmap -T4 -r 10.10.1.0/24C.    nmap -T4 -O 10.10.0.0/24D.    nmap -T4 -q 10.10.0.0/24 Answer: AExplanation:command = nmap -T4 -Fdescription = This scan is faster than a normal scan because it uses the aggressive timing template and scans fewer ports.https://svn.nmap.org/nmap/zenmap/share/zenmap/config/scan_profile.usp QUESTION 2You have compromised a server on a network and successfully opened a shell.You aimed to identify all operating systems running on the network.However, as you attempt to fingerprint all machines in the network using the nmap syntax below, it is not going through. invictus@victim_server:~$ nmap -T4 -O 10.10.0.0/24TCP/IP fingerprinting (for OS scan) xxxxxxx xxxxxx xxxxxxxxx.QUITTING! What seems to be wrong? A.    OS Scan requires root privileges.B.    The nmap syntax is wrong.C.    This is a common behavior for a corrupted nmap application.D.    The outgoing TCP/IP fingerprinting is blocked by the host firewall. Answer: AExplanation:You requested a scan type which requires root privileges.http://askubuntu.com/questions/433062/using-nmap-for-information-regarding-web-host QUESTION 3Which of the following statements is TRUE? A.    Sniffers operate on Layer 2 of the OSI modelB.    Sniffers operate on Layer 3 of the OSI modelC.    Sniffers operate on both Layer 2 & Layer 3 of the OSI model.D.    Sniffers operate on the Layer 1 of the OSI model. Answer: AExplanation:The OSI layer 2 is where packet sniffers collect their data.https://en.wikipedia.org/wiki/Ethernet_frame QUESTION 4You are logged in as a local admin on a Windows 7 system and you need to launch the Computer Management Console from command line.Which command would you use? A.    c:compmgmt.mscB.    c:services.mscC.    c:ncpa.cpD.    c:gpedit Answer: AExplanation:To start the Computer Management Console from command line just type compmgmt.msc / computer:computername in your run box or at the command line and it should automatically open the Computer Management console.http://www.waynezim.com/tag/compmgmtmsc/ QUESTION 5What is the best description of SQL Injection? A.    It is an attack used to gain unauthorized access to a database.B.    It is an attack used to modify code in an application.C.    It is a Man-in-the-Middle attack between your SQL Server and Web App Server.D.    It is a Denial of Service Attack. Answer: AExplanation:SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).https://en.wikipedia.org/wiki/SQL_injection QUESTION 6Which of the following is the BEST way to defend against network sniffing? A.    Using encryption protocols to secure network communicationsB.    Register all machines MAC Address in a Centralized DatabaseC.    Restrict Physical Access to Server Rooms hosting Critical ServersD.    Use Static IP Address Answer: AExplanation:A way to protect your network traffic from being sniffed is to use encryption such as Secure Sockets Layer (SSL) or Transport Layer Security (TLS). Encryption doesn't prevent packet sniffers from seeing source and destination information, but it does encrypt the data packet's payload so that all the sniffer sees is encrypted gibberish.http://netsecurity.about.com/od/informationresources/a/What-Is-A-Packet-Sniffer.htm QUESTION 7You have successfully gained access to a linux server and would like to ensure that the succeeding outgoing traffic from this server will not be caught by a Network Based Intrusion Detection Systems (NIDS).What is the best way to evade the NIDS? A.    EncryptionB.    Protocol IsolationC.    Alternate Data StreamsD.    Out of band signalling Answer: AExplanation:When the NIDS encounters encrypted traffic, the only analysis it can perform is packet level analysis, since the application layer contents are inaccessible. Given that exploits against today's networks are primarily targeted against network services (application layer entities), packet level analysis ends up doing very little to protect our core business assets.http://www.techrepublic.com/article/avoid-these-five-common-ids-implementation-errors/ QUESTION 8You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration? alert tcp any any -> 192.168.100.0/24 21 (msg: "FTP on the network!";) A.    An Intrusion Detection SystemB.    A firewall IPTableC.    A Router IPTableD.    FTP Server rule Answer: AExplanation:Snort is an open source network intrusion detection system (NIDS) for networks .Snort rule example:This example is a rule with a generator id of 1000001.alert tcp any any -> any 80 (content:"BOB"; gid:1000001; sid:1; rev:1;)http://manual-snort-org.s3-website-us-east-1.amazonaws.com/node31.html QUESTION 9What is the benefit of performing an unannounced Penetration Testing? A.    The tester will have an actual security posture visibility of the target network.B.    Network security would be in a "best state" posture.C.    It is best to catch critical infrastructure unpatched.D.    The tester could not provide an honest analysis. Answer: AExplanation:Real life attacks will always come without expectation and they will often arrive in ways that are highly creative and very hard to plan for at all. This is, after all, exactly how hackers continue to succeed against network security systems, despite the billions invested in the data protection industry.A possible solution to this danger is to conduct intermittent "unannounced" penentration tests whose scheduling and occurrence is only known to the hired attackers and upper management staff instead of every security employee, as would be the case with "announced" penetration tests that everyone has planned for in advance. The former may be better at detecting realistic weaknesses.http://www.sitepronews.com/2013/03/20/the-pros-and-cons-of-penetration-testing/ QUESTION 10You have successfully compromised a machine on the network and found a server that is alive on the same network. You tried to ping it but you didn't get any response back.What is happening? A.    ICMP could be disabled on the target server.B.    The ARP is disabled on the target server.C.    TCP/IP doesn't support ICMP.D.    You need to run the ping command with root privileges. Answer: AExplanation:The ping utility is implemented using the ICMP "Echo request" and "Echo reply" messages.Note: The Internet Control Message Protocol (ICMP) is one of the main protocols of the internet protocol suite. It is used by network devices, like routers, to send error messages indicating, for example, that a requested service is not available or that a host or router could not be reached.https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol QUESTION 11Under the "Post-attack Phase and Activities", it is the responsibility of the tester to restore the systems to a pre-test state.Which of the following activities should not be included in this phase? (see exhibit)A.    IIIB.    IVC.    III and IVD.    All should be included. Answer: AExplanation:The post-attack phase revolves around returning any modified system(s) to the pretest state. Examples of such activities:Removal of any files, tools, exploits, or other test-created objects uploaded to the system during testingRemoval or reversal of any changes to the registry made during system testingComputer and Information Security Handbook, John R. Vacca (2012), page 531 QUESTION 12It is a regulation that has a set of guidelines, which should be adhered to by anyone who handles any electronic medical data. These guidelines stipulate that all medical practices must ensure that all necessary measures are in place while saving, accessing, and sharing any electronic medical data to keep patient data secure.Which of the following regulations best matches the description? A.    HIPAAB.    ISO/IEC 27002C.    COBITD.    FISMA Answer: AExplanation:The HIPAA Privacy Rule regulates the use and disclosure of Protected Health Information (PHI) held by "covered entities" (generally, health care clearinghouses, employer sponsored health plans, health insurers, and medical service providers that engage in certain transactions.)[15] By regulation, the Department of Health and Human Services extended the HIPAA privacy rule to independent contractors of covered entities who fit within the definition of "business associates".https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act#Privacy_Rule QUESTION 13Which of the following is a component of a risk assessment? A.    Administrative safeguardsB.    Physical securityC.    DMZD.    Logical interface Answer: AExplanation:Risk assessment include:The total process of identifying, measuring, and minimizing uncertain events affecting AIS resources.It includes risk analysis, cost benefit analysis, safeguard selection, security test and evaluation, safeguard implementation, and systems review.The total process of identifying, controlling, and eliminating or minimizing uncertain events that may affect system resources.lt includes risk analysis, cost benefit analysis, selection, implementation and test, security evaluation of safeguards, and overall security review.https://en.wikipedia.org/wiki/IT_risk_management#Risk_assessment QUESTION 14A medium-sized healthcare IT business decides to implement a risk management strategy. Which of the following is NOT one of the five basic responses to risk? A.    DelegateB.    AvoidC.    MitigateD.    Accept Answer: AExplanation:There are five main ways to manage risk: acceptance, avoidance, transference, mitigation or exploitation.http://www.dbpmanagement.com/15/5-ways-to-manage-risk QUESTION 15Your company was hired by a small healthcare provider to perform a technical assessment on the network.What is the best approach for discovering vulnerabilities on a Windows-based computer? A.    Use a scan tool like NessusB.    Use the built-in Windows Update toolC.    Check MITRE.org for the latest list of CVE findingsD.    Create a disk image of a clean Windows installation Answer: AExplanation:Nessus is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools.The Nessus server is currently available for Unix, Linux and FreeBSD. The client is available for Unix-or Windows-based operating systems.Note: Significant capabilities of Nessus include:Compatibility with computers and servers of all sizes.Detection of security holes in local or remote hosts.Detection of missing security updates and patches.Simulated attacks to pinpoint vulnerabilities.Execution of security tests in a contained environment.Scheduled security audits. How to pass 312-50v9 exam easily? Are you struggling for the 312-50v9 exam? Good news, Lead2pass EC-Council technical experts have collected all the questions and answers which are updated to cover the knowledge points and enhance candidates' abilities. We offer the latest 312-50v9 PDF and VCE dumps with new version VCE player for free download, and the new 312-50v9 dump ensures your 312-50v9 exam 100% pass. EC-Council 312-50v9 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDSHZpNDRNRXpLekE 2017 EC-Council 312-50v9 exam dumps (All 589 Q&As) from Lead2pass: http://www.lead2pass.com/312-50v9.html [100% Exam Pass Guaranteed] --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2017-03-14 01:54:58 Post date GMT: 2017-03-14 01:54:58 Post modified date: 2017-03-14 01:54:58 Post modified date GMT: 2017-03-14 01:54:58 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com