312-49v10 Practice Test Questions

596 Questions


Topic 1: Exam Pool A

The use of warning banners helps a company avoid litigation by overcoming an employee
assumed __________________________. When connecting to the company's intranet,
network or Virtual Private Network(VPN) and will allow the company's investigators to
monitor, search and retrieve information stored within the network.


A.

Right to work


B.

Right of free speech


C.

Right to Internet Access


D.

Right of Privacy





D.
  

Right of Privacy



During the course of a corporate investigation, you find that an Employee is committing a crime. Can the Employer file a criminal complaint with Police?


A.

Yes, and all evidence can be turned over to the police


B.

Yes, but only if you turn the evidence over to a federal law enforcement agency


C.

No, because the investigation was conducted without following standard police
procedures


D.

No, because the investigation was conducted without warrant





A.
  

Yes, and all evidence can be turned over to the police



Office Documents (Word, Excel and PowerPoint) contain a code that allows tracking the MAC or unique identifier of the machine that created the document. What is that code called?


A.

Globally unique ID


B.

Microsoft Virtual Machine Identifier


C.

Personal Application Protocol


D.

Individual ASCII string





A.
  

Globally unique ID



You are the network administrator for a small bank in Dallas, Texas. To ensure network
security, you enact a security policy that requires all users to have 14 character passwords.
After giving your users 2 weeks notice, you change the Group Policy to force 14 character
passwords. A week later you dump the SAM database from the standalone server and run
a password-cracking tool against it. Over 99% of the passwords are broken within an hour.
Why were these passwords cracked so Quickly?


A.

Passwords of 14 characters or less are broken up into two 7-character hashes


B.

A password Group Policy change takes at least 3 weeks to completely replicate
throughout a network


C.

Networks using Active Directory never use SAM databases so the SAM database pulled was empty


D.

The passwords that were cracked are local accounts on the Domain Controller





A.
  

Passwords of 14 characters or less are broken up into two 7-character hashes



At what layer of the OSI model do routers function on?


A.

4


B.

3


C.

1


D.

5





B.
  

3



Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and
wants to hack into his former company's network. Since Simon remembers some of the
server names, he attempts to run the axfr and ixfr commands using DIG. What is Simon
trying to accomplish here?


A.

Send DOS commands to crash the DNS servers


B.

Perform DNS poisoning


C.

Perform a zone transfer


D.

Enumerate all the users in the domain





C.
  

Perform a zone transfer



What does the acronym POST mean as it relates to a PC? 


A.

Primary Operations Short Test


B.

PowerOn Self Test


C.

Pre Operational Situation Test


D.

Primary Operating System Test





B.
  

PowerOn Self Test



If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?


A.

The zombie will not send a response


B.

31402


C.

31399


D.

31401





D.
  

31401



With Regard to using an Antivirus scanner during a computer forensics investigation, You should:


A.

Scan the suspect hard drive before beginning an investigation


B.

Never run a scan on your forensics workstation because it could change your systems configuration


C.

Scan your forensics workstation at intervals of no more than once every five minutes during an investigation


D.

Scan your Forensics workstation before beginning an investigation





D.
  

Scan your Forensics workstation before beginning an investigation



You are carrying out the last round of testing for your new website before it goes live. The
website has many dynamic pages and connects to a SQL backend that accesses your
product inventory in a database. You come across a web security site that recommends
inputting the following code into a search field on web pages to check for vulnerabilities:
When you type this and click on search, you receive a pop-up window that says: "This is a
test."
What is the result of this test?


A.

Your website is vulnerable to CSS


B.

Your website is not vulnerable


C.

Your website is vulnerable to SQL injection


D.

Your website is vulnerable to web bugs





A.
  

Your website is vulnerable to CSS



What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?


A.

ICMP header field


B.

TCP header field


C.

IP header field


D.

UDP header field





B.
  

TCP header field



Larry is an IT consultant who works for corporations and government agencies. Larry plans on shutting down the city's network using BGP devices and zombies? What type of Penetration Testing is Larry planning to carry out?


A.

Router Penetration Testing


B.

DoS Penetration Testing


C.

Firewall Penetration Testing


D.

Internal Penetration Testing





B.
  

DoS Penetration Testing




Page 5 out of 50 Pages
Previous