112-12 Real Exam

Page 1

Eccouncil CODE: 112-12 Exam Name: Security5 Certification

Click the link below to buy full version as Low as $39

http://www.testsexpert.com/112-12.html

Type

Microsoft

1

IBM

Demo

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/112-12.html

Symantec


Question: 1 You work as a Security Administrator for Net Perfect Inc. The company has a Windows-based network. The employees use Internet Explorer for Internet surfing. You want to block access to the vulnerable sites from the internal network of the company. To accomplish the task, you need to configure some security settings for Internet Explorer. Which of the following features of Internet Explorer do you need to configure? A. Internet Explorer Compatibility Evaluator B. Pop-up blocker C. InPrivate Browsing D. Content Advisor

Answer: D Question: 2 You work as a Security Administrator for BlueWells Inc. The company has a Windows-based network.You have been assigned a project that aims to strengthen the security of the company. You want to perform system hardening. Which of the following steps can you take to accomplish the task? Each correct answer represents a complete solution. Choose all that apply. A. Enabling the guest account B. Installing anti-virus and anti-spyware software C. Enabling automatic updates to ensure that the operating system is patched and up-to-date D. Disabling auditing E. Disabling the guest account F. Removing and uninstalling unnecessary programs G. Enabling auditing

Answer: B,C,E,F,G Question: 3 Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses 'Faulkner' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew's password? Each correct answer represents a complete solution. Choose all that apply.

Microsoft

2

IBM

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/112-12.html

Symantec


A. Dictionary-based attack B. Social engineering C. Zero-day attack D. Denial-of-service (DoS) attack E. Brute force attack F. Password guessing G. Buffer-overflow attack H. Rainbow attack

Answer: A,B,E,F,H Question: 4 John works as a Network Security Administrator for NetPerfect Inc. The manager of the company has told John that the company's phone bill has increased drastically. John suspects that the company's phone system has been cracked by a malicious hacker. Which attack is used by malicious hackers to crack the phone system? A. Man-in-the-middle attack B. Sequence++ attack C. War dialing D. Phreaking

Answer: D Question: 5 Mark works as an Assistant for InfoTech Inc. He is using Microsoft Outlook 2007. He is going for technical training for one week starting from 17th October, 2007. He will leave at 9:00 AM on 17th October and come back at 8:00 PM on 24th October. He wants to ensure that all his colleagues receive the following message when he is not in office: Dear Sender, Thank you for your email. I am currently out of office for training. However, I will try to respond to your message as soon as I can. Please expect a delay in my response. Best Regards Mark In order to accomplish the task, Mark has to use the Out-of-Office Assistant tool. Take the appropriate steps in the following dialog box to accomplish the task.

Microsoft

3

IBM

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/112-12.html

Symantec


A.

Microsoft

4

IBM

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/112-12.html

Symantec


Answer: A Question: 6 You work as a Desktop Technician for Umbrella Inc. The company has a Windows-based network. You receive an e-mail from the network administrator's e-mail ID asking you to provide your password so that he can make changes to your profile. You suspect that someone is trying to hack your password after you have confirmed that the network administrator did not send any such type of e-mail. Which of the following types of attacks have been executed? Each correct answer represents a part of the solution. Choose all that apply. A. Buffer-overflow attack B. Zero-day attack C. Social engineering D. E-mail spoofing

Answer: C,D Microsoft

5

IBM

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/112-12.html

Symantec


Question: 7 Which of the following root keys stores information about hardware configurations and applications information that pertains to the computer in the registry of Windows XP? A. HKEY CLASSES ROOT B. HKEY CURRENT USER C. HKEY USERS D. HKEY LOCAL MACHINE E. HKEY CURRENT CONFIG

Answer: D Question: 8 You work as a Data Helpdesk Technician for Bluewells Inc. The company has a Windows-based network. You use Microsoft Outlook as the default mail client for accessing e-mails. You have given your e-mail address on the Web for receiving information on new technologies. You start receiving unwanted e-mail from various websites after registering. Which of the following terms refer to such types of unwanted email? Each correct answer represents a complete solution. Choose all that apply. A. Botnet B. Zombie C. Junk e-mail D. Spam

Answer: C,D Question: 9 You work as a Desktop Technician for DataSoft Inc. Due to a Trojan attack, your computer system cannot open in normal mode and GUI safe mode. You have some important text files in the C drive in a folder named impdoc. You want to save these important files to the F drive of the hard disk. To accomplish the task, you run the system in safe mode with the command prompt. Which of the following commands will you run to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply. A. copy *.txt f: B. cd impdoc

Microsoft

6

IBM

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/112-12.html

Symantec


C. copy *.* f: D. md E. copy *.doc f: F. cd\

Answer: A,B,F Question: 10 You work as a Desktop Technician for NetPerfect Inc. The company has a Windows-based network.You have some important MS-Word files which you want to protect from others. What will you do to protect these files? Each correct answer represents a complete solution. Choose all that apply. A. Set the extension of the files as .pdf. B. Put a password to modify the files. C. Put a password to open the files. D. Hide the files.

Answer: B,C,D Question: 11 From the TreeView window, select the various cybercrimes and place them under their respective categories.

Microsoft

7

IBM

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/112-12.html

Symantec


A.

Microsoft

8

IBM

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/112-12.html

Symantec


Answer: A Question: 12 You work as a computer operator for BlueWells Inc. The company has a Windows-based network. You find out that someone has manipulated your email account, as some of your mails have been deleted. You suspect that your password has been hacked by someone. You inform about this to Mark, who is a Security Administrator. After diagnosing your system, Mark finds a log file that contains lots of text including username and password. Mark tells you that someone has installed software on your system that is recording all the keyboard strokes in a predefined log file. Which of the following software is Mark discussing about? A. Keylogger B. Adware C. Anti-Virus D. Spyware

Microsoft

9

IBM

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/112-12.html

Symantec


Answer: A Question: 13 Maria works as a Desktop Technician for PassGuide Inc. She has received an e-mail from the MN Compensation Office with the following message: Dear Sir/Madam, My name is Edgar Rena, the director of compensation here at the MN Compensation Office in Chicago. We receive so many complaints about fraudulent activities that have been taking place in your region for the past few years. Due to the high volume loss of money, the MN compensation department has had an agreement with the appropriate authority to compensate each victim with a sum of USD$500,000.00. You were selected among the list of people to be paid this sum. To avoid any imperative mood by intending scammers, your payment has been transmuted into an International bank draft which can be cashed at any local bank in your country. Please fill the below details and send it to our secretary for your compensation bank draft. Full name: ______ Address: ________ Tel: ____________ Fill & Send to: Dr. Michael Brown MN Compensation Office, IL Tel: +1-866-233-8434 Email: micbrown@live.com Further instructions shall be given to you by our secretary as soon as you contact him. To avoid losing your compensation, you are requested to pay the sum of $350 for Insurance Premium to our secretary. Thanks and God bless. If Maria replies to this mail, which of the following attacks may she become vulnerable to? A. Phishing attack B. Mail bombing C. CookieMonster attack D. SYN attack

Answer: A Question: 14 John works as a professional Ethical Hacker for SecureEnet Inc. The company has a Windows-based network. All client computers run on Windows XP. A project has been assigned to John to investigate about the open ports responsible for various malicious attacks on the network. John wants to use the DOS command-line utility to find out the open ports. Which of the following DOS commands will John use to accomplish the task? A. netstat B. nslookup C. tracert and pathping D. nbtstat

Answer: A Microsoft

10

IBM

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/112-12.html

Symantec


Question: 15 John works as a Security Administrator for NetPerfect Inc. The company has a Windows-based network. The company uses Internet Explorer 8 as its Web browser. John has been assigned a project to check the Internet Explorer security settings. During the analysis, he finds that the users need to visit some insecure Web sites often. John wants to provide secure access to these insecure Web sites with some special security settings. What will he do to accomplish the task? Each correct answer represents a complete solution. Choose all that apply. A. Bookmark the Web sites. B. Use InPrivate browsing. C. Enable Pop-up blocker. D. Add these Web sites to the restricted site list.

Answer: B,C,D Question: 16 Which of the following statements is true about vulnerability? A. It is a password cracking algorithm. B. It is the weakness of any programming code. C. It is a virus. D. It is an exploit.

Answer: B Question: 17 Which of the following attacks is designed to deduce the brand and/or version of an operating system or application? A. Vulnerability assessment B. Port scanning C. Banner grabbing D. OS fingerprinting

Answer: C Microsoft

11

IBM

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/112-12.html

Symantec


Question: 18 Which of the following computer crimes occurs mostly according to the CSI/FBI computer crime and security survey? A. Virus attacks B. Theft of proprietary information C. Sabotage of data and/or network D. Unauthorized access by insiders

Answer: A Question: 19 Which of the following agencies is responsible for handling computer crimes in the United States? A. The Federal Bureau of Investigation (FBI) and the Secret Service B. The FBI only C. The Central Intelligence Agency (CIA) D. The National Security Agency (NSA)

Answer: A Question: 20 All of the following are computer viruses except for which one? A. Code red B. Sircam C. Nimda D. Sniffer

Answer: D

Microsoft

12

IBM

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/112-12.html

Symantec


Eccouncil CODE: 112-12 Exam Name: Security5 Certification

Click the link below to buy full version as Low as $39

http://www.testsexpert.com/112-12.html Microsoft

Cisco

IBM

HP

Other

MCTS 70-336 70-337

CCNA 640-802 640-822 640-816 640-460

IBM Lotus

000-M42 000-M60

AIS

MBS 70-332

CCNP 642-832 642-813 642-825 642-845

000-G01 000-M44

MCAS 77-602

CCSP 642-627 642-637 642-647 642-545

000-444 000-910

MCSE 70-281 70-282

CCIE 350-001 350-018 350-029 350-060

COG-105 COG-185

MCSA 2003 70-620

DATA CENTER 642-972 642-973 642-974 642-975

000-005 000-032

70-323 9L0-063 9L0-010 9L0-517 HP2-E53 70-321 650-179 1Y0-A20 00M-646 MB2-876 646-206 9L0-314 MB6-884 220-701 650-196 3305 MB6-871 HP2-Z22 9L0-407 9A0-146 HP2-H23 000-184 1Z0-527 HP2-B91 000-781 M70-201 M70-101 7004 HP3-X11 HP3-X08

70-462

98-361

MB3-861

77-601 77-604 70-284

70-461 70-680

70-463

MB3-862

77-605 70-285

70-291

Microsoft

13

IBM

000-M41 000-M62

IBM Mastery

000-M43 000-M45

HP0-311

HP0-M28

HP0-A25

HP0-M30

APC

HP0-D11 HP0-S29

HP0-J37 HP0-P14

Solutions Expert

MASE HP0-J33 HP0-M48 HP0-M49 HP0-M50

IBM Cognos

ASE

000-640 000-913 COG-180 COG-200

IBM Specialist

000-015 000-042

HP0-066 HP0-781

HP0-082 HP0-782

CSE

HP0-090 HP0-277

HP0-276 HP0-760

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/112-12.html

Symantec


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.