P.S. Exact 312-50v10 training tools are available on Google Drive, GET MORE: https://drive.google.com/open?id=1zsw3xzCsgbQD0e_ZoE_G5GuVGlIbaphk
New Questions 9
Which regulation defines security and privacy controls for Federal information systems and organizations?
A. HIPAA
B. EU Safe Harbor
C. PCI-DSS
D. NIST-800-53
Answer: D
New Questions 10
Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?
A. 123
B. 161
C. 69
D. 113
Answer: A
New Questions 11
A company's Web development team has become aware of a certain type of security vulnerability in their Web software. To mitigate the possibility of this vulnerability being exploited, the team wants to modify the software requirements to disallow users from entering HTML as input into their Web application.
What kind of Web application vulnerability likely exists in their software?
A. Cross-site scripting vulnerability
B. Web site defacement vulnerability
C. SQL injection vulnerability
D. Cross-site Request Forgery vulnerability
Answer: A
New Questions 12
Which of the following provides a security professional with most information about the systemu2021s security posture?
A. Wardriving, warchalking, social engineering
B. Social engineering, company site browsing, tailgating
C. Phishing, spamming, sending trojans
D. Port scanning, banner grabbing, service identification
Answer: D
New Questions 13
How does the Address Resolution Protocol (ARP) work?
A. It sends a request packet to all the network elements, asking for the domain name from a specific IP.
B. It sends a request packet to all the network elements, asking for the MAC address from a specific IP.
C. It sends a reply packet to all the network elements, asking for the MAC address from a specific IP.
D. It sends a reply packet for a specific IP, asking for the MAC address.
Answer: B
New Questions 14
Which of these is capable of searching for and locating rogue access points?
A. HIDS
B. NIDS
C. WISS
D. WIPS
Answer: D
New Questions 15
Bob finished a C programming course and created a small C application to monitor the network traffic and produce alerts when any origin sends u201cmanyu201d IP packets, based on the average number of packets sent by all origins and using some thresholds.
In concept, the solution developed by Bob is actually:
A. Just a network monitoring tool
B. A signature-based IDS
C. A hybrid IDS
D. A behavior-based IDS
Answer: A
New Questions 16
Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?
A. ICMP Echo scanning
B. SYN/FIN scanning using IP fragments
C. ACK flag probe scanning
D. IPID scanning
Answer: B
New Questions 17
Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipientu2021s consent, similar to email spamming?
A. Bluesmacking
B. Bluesniffing
C. Bluesnarfing
D. Bluejacking
Answer: D
New Questions 18
During the process of encryption and decryption, what keys are shared?
A. Private keys
B. User passwords
C. Public keys
D. Public and private keys
Answer: C
100% Avant-garde EC-Council 312-50v10 Questions & Answers shared by Dumpscollection, Get HERE: http://www.dumpscollection.net/dumps/312-50v10/ (New Q&As)