Eccouncil CODE: 112-12 Exam Name: Security5 Certification
Click the link below to buy full version as Low as $39
http://www.testsexpert.com/112-12.html
Type
Microsoft
1
IBM
Demo
HP Cisco Oracle Instant download after purchase
http://www.testsexpert.com/112-12.html
Symantec
Question: 1 You work as a Security Administrator for Net Perfect Inc. The company has a Windows-based network. The employees use Internet Explorer for Internet surfing. You want to block access to the vulnerable sites from the internal network of the company. To accomplish the task, you need to configure some security settings for Internet Explorer. Which of the following features of Internet Explorer do you need to configure? A. Internet Explorer Compatibility Evaluator B. Pop-up blocker C. InPrivate Browsing D. Content Advisor
Answer: D Question: 2 You work as a Security Administrator for BlueWells Inc. The company has a Windows-based network.You have been assigned a project that aims to strengthen the security of the company. You want to perform system hardening. Which of the following steps can you take to accomplish the task? Each correct answer represents a complete solution. Choose all that apply. A. Enabling the guest account B. Installing anti-virus and anti-spyware software C. Enabling automatic updates to ensure that the operating system is patched and up-to-date D. Disabling auditing E. Disabling the guest account F. Removing and uninstalling unnecessary programs G. Enabling auditing
Answer: B,C,E,F,G Question: 3 Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses 'Faulkner' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew's password? Each correct answer represents a complete solution. Choose all that apply.
Microsoft
2
IBM
HP Cisco Oracle Instant download after purchase
http://www.testsexpert.com/112-12.html
Symantec
A. Dictionary-based attack B. Social engineering C. Zero-day attack D. Denial-of-service (DoS) attack E. Brute force attack F. Password guessing G. Buffer-overflow attack H. Rainbow attack
Answer: A,B,E,F,H Question: 4 John works as a Network Security Administrator for NetPerfect Inc. The manager of the company has told John that the company's phone bill has increased drastically. John suspects that the company's phone system has been cracked by a malicious hacker. Which attack is used by malicious hackers to crack the phone system? A. Man-in-the-middle attack B. Sequence++ attack C. War dialing D. Phreaking
Answer: D Question: 5 Mark works as an Assistant for InfoTech Inc. He is using Microsoft Outlook 2007. He is going for technical training for one week starting from 17th October, 2007. He will leave at 9:00 AM on 17th October and come back at 8:00 PM on 24th October. He wants to ensure that all his colleagues receive the following message when he is not in office: Dear Sender, Thank you for your email. I am currently out of office for training. However, I will try to respond to your message as soon as I can. Please expect a delay in my response. Best Regards Mark In order to accomplish the task, Mark has to use the Out-of-Office Assistant tool. Take the appropriate steps in the following dialog box to accomplish the task.
Microsoft
3
IBM
HP Cisco Oracle Instant download after purchase
http://www.testsexpert.com/112-12.html
Symantec
A.
Microsoft
4
IBM
HP Cisco Oracle Instant download after purchase
http://www.testsexpert.com/112-12.html
Symantec
Answer: A Question: 6 You work as a Desktop Technician for Umbrella Inc. The company has a Windows-based network. You receive an e-mail from the network administrator's e-mail ID asking you to provide your password so that he can make changes to your profile. You suspect that someone is trying to hack your password after you have confirmed that the network administrator did not send any such type of e-mail. Which of the following types of attacks have been executed? Each correct answer represents a part of the solution. Choose all that apply. A. Buffer-overflow attack B. Zero-day attack C. Social engineering D. E-mail spoofing
Answer: C,D Microsoft
5
IBM
HP Cisco Oracle Instant download after purchase
http://www.testsexpert.com/112-12.html
Symantec
Question: 7 Which of the following root keys stores information about hardware configurations and applications information that pertains to the computer in the registry of Windows XP? A. HKEY CLASSES ROOT B. HKEY CURRENT USER C. HKEY USERS D. HKEY LOCAL MACHINE E. HKEY CURRENT CONFIG
Answer: D Question: 8 You work as a Data Helpdesk Technician for Bluewells Inc. The company has a Windows-based network. You use Microsoft Outlook as the default mail client for accessing e-mails. You have given your e-mail address on the Web for receiving information on new technologies. You start receiving unwanted e-mail from various websites after registering. Which of the following terms refer to such types of unwanted email? Each correct answer represents a complete solution. Choose all that apply. A. Botnet B. Zombie C. Junk e-mail D. Spam
Answer: C,D Question: 9 You work as a Desktop Technician for DataSoft Inc. Due to a Trojan attack, your computer system cannot open in normal mode and GUI safe mode. You have some important text files in the C drive in a folder named impdoc. You want to save these important files to the F drive of the hard disk. To accomplish the task, you run the system in safe mode with the command prompt. Which of the following commands will you run to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply. A. copy *.txt f: B. cd impdoc
Microsoft
6
IBM
HP Cisco Oracle Instant download after purchase
http://www.testsexpert.com/112-12.html
Symantec
C. copy *.* f: D. md E. copy *.doc f: F. cd\
Answer: A,B,F Question: 10 You work as a Desktop Technician for NetPerfect Inc. The company has a Windows-based network.You have some important MS-Word files which you want to protect from others. What will you do to protect these files? Each correct answer represents a complete solution. Choose all that apply. A. Set the extension of the files as .pdf. B. Put a password to modify the files. C. Put a password to open the files. D. Hide the files.
Answer: B,C,D Question: 11 From the TreeView window, select the various cybercrimes and place them under their respective categories.
Microsoft
7
IBM
HP Cisco Oracle Instant download after purchase
http://www.testsexpert.com/112-12.html
Symantec
A.
Microsoft
8
IBM
HP Cisco Oracle Instant download after purchase
http://www.testsexpert.com/112-12.html
Symantec
Answer: A Question: 12 You work as a computer operator for BlueWells Inc. The company has a Windows-based network. You find out that someone has manipulated your email account, as some of your mails have been deleted. You suspect that your password has been hacked by someone. You inform about this to Mark, who is a Security Administrator. After diagnosing your system, Mark finds a log file that contains lots of text including username and password. Mark tells you that someone has installed software on your system that is recording all the keyboard strokes in a predefined log file. Which of the following software is Mark discussing about? A. Keylogger B. Adware C. Anti-Virus D. Spyware
Microsoft
9
IBM
HP Cisco Oracle Instant download after purchase
http://www.testsexpert.com/112-12.html
Symantec
Answer: A Question: 13 Maria works as a Desktop Technician for PassGuide Inc. She has received an e-mail from the MN Compensation Office with the following message: Dear Sir/Madam, My name is Edgar Rena, the director of compensation here at the MN Compensation Office in Chicago. We receive so many complaints about fraudulent activities that have been taking place in your region for the past few years. Due to the high volume loss of money, the MN compensation department has had an agreement with the appropriate authority to compensate each victim with a sum of USD$500,000.00. You were selected among the list of people to be paid this sum. To avoid any imperative mood by intending scammers, your payment has been transmuted into an International bank draft which can be cashed at any local bank in your country. Please fill the below details and send it to our secretary for your compensation bank draft. Full name: ______ Address: ________ Tel: ____________ Fill & Send to: Dr. Michael Brown MN Compensation Office, IL Tel: +1-866-233-8434 Email: micbrown@live.com Further instructions shall be given to you by our secretary as soon as you contact him. To avoid losing your compensation, you are requested to pay the sum of $350 for Insurance Premium to our secretary. Thanks and God bless. If Maria replies to this mail, which of the following attacks may she become vulnerable to? A. Phishing attack B. Mail bombing C. CookieMonster attack D. SYN attack
Answer: A Question: 14 John works as a professional Ethical Hacker for SecureEnet Inc. The company has a Windows-based network. All client computers run on Windows XP. A project has been assigned to John to investigate about the open ports responsible for various malicious attacks on the network. John wants to use the DOS command-line utility to find out the open ports. Which of the following DOS commands will John use to accomplish the task? A. netstat B. nslookup C. tracert and pathping D. nbtstat
Answer: A Microsoft
10
IBM
HP Cisco Oracle Instant download after purchase
http://www.testsexpert.com/112-12.html
Symantec
Question: 15 John works as a Security Administrator for NetPerfect Inc. The company has a Windows-based network. The company uses Internet Explorer 8 as its Web browser. John has been assigned a project to check the Internet Explorer security settings. During the analysis, he finds that the users need to visit some insecure Web sites often. John wants to provide secure access to these insecure Web sites with some special security settings. What will he do to accomplish the task? Each correct answer represents a complete solution. Choose all that apply. A. Bookmark the Web sites. B. Use InPrivate browsing. C. Enable Pop-up blocker. D. Add these Web sites to the restricted site list.
Answer: B,C,D Question: 16 Which of the following statements is true about vulnerability? A. It is a password cracking algorithm. B. It is the weakness of any programming code. C. It is a virus. D. It is an exploit.
Answer: B Question: 17 Which of the following attacks is designed to deduce the brand and/or version of an operating system or application? A. Vulnerability assessment B. Port scanning C. Banner grabbing D. OS fingerprinting
Answer: C Microsoft
11
IBM
HP Cisco Oracle Instant download after purchase
http://www.testsexpert.com/112-12.html
Symantec
Question: 18 Which of the following computer crimes occurs mostly according to the CSI/FBI computer crime and security survey? A. Virus attacks B. Theft of proprietary information C. Sabotage of data and/or network D. Unauthorized access by insiders
Answer: A Question: 19 Which of the following agencies is responsible for handling computer crimes in the United States? A. The Federal Bureau of Investigation (FBI) and the Secret Service B. The FBI only C. The Central Intelligence Agency (CIA) D. The National Security Agency (NSA)
Answer: A Question: 20 All of the following are computer viruses except for which one? A. Code red B. Sircam C. Nimda D. Sniffer
Answer: D
Microsoft
12
IBM
HP Cisco Oracle Instant download after purchase
http://www.testsexpert.com/112-12.html
Symantec
Eccouncil CODE: 112-12 Exam Name: Security5 Certification
Click the link below to buy full version as Low as $39
http://www.testsexpert.com/112-12.html Microsoft
Cisco
IBM
HP
Other
MCTS 70-336 70-337
CCNA 640-802 640-822 640-816 640-460
IBM Lotus
000-M42 000-M60
AIS
MBS 70-332
CCNP 642-832 642-813 642-825 642-845
000-G01 000-M44
MCAS 77-602
CCSP 642-627 642-637 642-647 642-545
000-444 000-910
MCSE 70-281 70-282
CCIE 350-001 350-018 350-029 350-060
COG-105 COG-185
MCSA 2003 70-620
DATA CENTER 642-972 642-973 642-974 642-975
000-005 000-032
70-323 9L0-063 9L0-010 9L0-517 HP2-E53 70-321 650-179 1Y0-A20 00M-646 MB2-876 646-206 9L0-314 MB6-884 220-701 650-196 3305 MB6-871 HP2-Z22 9L0-407 9A0-146 HP2-H23 000-184 1Z0-527 HP2-B91 000-781 M70-201 M70-101 7004 HP3-X11 HP3-X08
70-462
98-361
MB3-861
77-601 77-604 70-284
70-461 70-680
70-463
MB3-862
77-605 70-285
70-291
Microsoft
13
IBM
000-M41 000-M62
IBM Mastery
000-M43 000-M45
HP0-311
HP0-M28
HP0-A25
HP0-M30
APC
HP0-D11 HP0-S29
HP0-J37 HP0-P14
Solutions Expert
MASE HP0-J33 HP0-M48 HP0-M49 HP0-M50
IBM Cognos
ASE
000-640 000-913 COG-180 COG-200
IBM Specialist
000-015 000-042
HP0-066 HP0-781
HP0-082 HP0-782
CSE
HP0-090 HP0-277
HP0-276 HP0-760
HP Cisco Oracle Instant download after purchase
http://www.testsexpert.com/112-12.html
Symantec