Latest ECCouncil 312-50v8 Real Exam Download 431-440

QUESTION 431
In the OSI model, where does PPTP encryption take place?
A. Transport layer
B. Application layer
C. Data link layer
D. Network layer
Answer: 
QUESTION 432
What is the main advantage that a network-based IDS/IPS system has over a host-based solution?
A. They do not use host system resources.
B. They are placed at the boundary,allowing them to inspect all traffic.
C. They are easier to install and configure.
D. They will not interfere with user interfaces.
Answer: 
QUESTION 433
An NMAP scan of a server shows port 25.is open..What risk could this pose?
A. Open printer sharing
B. Web portal data leak
C. Clear text authentication
D. Active mail relay
Answer: 
QUESTION 434
Which of the following are variants of mandatory access control mechanisms? (Choose two.)
A. Two factor authentication
B. Acceptable use policy
C. Username / password
D. User education program
E. Sign in register
Answer: A,C 
QUESTION 435
An.attacker uses a communication channel within an operating system that is neither designed nor intended to transfer information. What is the name of the communications channel?
A. Classified
B. Overt
C. Encrypted
D. Covert
Answer: 
QUESTION 436
Which of the following is used to indicate a single-line comment in structured query language (SQL)?
A. –
B. ||
C. %%
D. ”
Answer: 
QUESTION 437
What is the primary drawback to using advanced encryption standard (AES) algorithm with a 256 bit key to share sensitive data?
A. Due to the key size,the time it will take to encrypt and decrypt the message hinders efficient communication.
B. To get messaging programs to function with this algorithm requires complex configurations.
C. It has.been proven to be a weak cipher; therefore,should not be trusted to protect sensitive data.
D. It.is a symmetric key algorithm,meaning each recipient must receive the key through a different channel than the message.
Answer: 
QUESTION 438
Pentest results.indicate that voice over IP traffic is traversing a network..Which of the following tools will decode a packet capture and extract the voice conversations?
A. Cain
B. John the Ripper
C. Nikto
D. Hping
Answer: 
QUESTION 439
Information gathered from social networking websites such as Facebook, Twitter and LinkedIn can be used to launch which of the following types of attacks? (Choose two.)
A. Smurf attack
B. Social engineering attack
C. SQL injection attack
D. Phishing attack
E. Fraggle attack
F. Distributed denial of service attack
Answer: B,D 
QUESTION 440
Which of the following examples best represents a logical or technical.control?
A. Security tokens
B. Heating and air conditioning
C. Smoke and fire alarms
D. Corporate security policy
Answer: 

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s