Security5 certification 112 12 exam answers pdf

Page 1

Eccouncil 112-12

Security5 Certification Click the link below to buy full version as Low as $39 http://www.examkill.com/112-12.html

ExamKill is team of experienced and educated professionals working day and night to develop preparation material for different fields in IT. These industries are including HP, IBM, Comptia, Orcale, Apple, Microsoft,Adobe, Nortel, Novell, Checkpoint etc with the following features.

Free Samples:

Free samples download are available for almost every product to check before

buy.

Complete Course Coverage: Experienced professionals are making sure to cover complete course so that you pass final exam.

Updated Material: Preparation material is updated and new; you can compare us with other providers in the same industry.

Privacy Protection:

Examkill team makes sure not to reveal your private information

including your credit card and other secret information.

Excellent Customer Support: You will get reply from examkill support within 8 hours for all your questions/concerns about anything.

www.examkill.com


Question: 1 You work as a Security Administrator for Net Perfect Inc. The company has a Windows-based network. The employees use Internet Explorer for Internet surfing. You want to block access to the vulnerable sites from the internal network of the company. To accomplish the task, you need to configure some security settings for Internet Explorer. Which of the following features of Internet Explorer do you need to configure? A. Internet Explorer Compatibility Evaluator B. Pop-up blocker C. InPrivate Browsing D. Content Advisor

Answer: D Question: 2 You work as a Security Administrator for BlueWells Inc. The company has a Windows-based network.You have been assigned a project that aims to strengthen the security of the company. You want to perform system hardening. Which of the following steps can you take to accomplish the task? Each correct answer represents a complete solution. Choose all that apply. A. Enabling the guest account B. Installing anti-virus and anti-spyware software C. Enabling automatic updates to ensure that the operating system is patched and up-to-date D. Disabling auditing E. Disabling the guest account F. Removing and uninstalling unnecessary programs G. Enabling auditing

Answer: B,C,E,F,G Question: 3 Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses 'Faulkner' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew's password? Each correct answer represents a complete solution. Choose all that apply. A. Dictionary-based attack B. Social engineering C. Zero-day attack D. Denial-of-service (DoS) attack E. Brute force attack F. Password guessing G. Buffer-overflow attack

http://www.examkill.com/112-12.html

Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper

2


H. Rainbow attack

Answer: A,B,E,F,H Question: 4 John works as a Network Security Administrator for NetPerfect Inc. The manager of the company has told John that the company's phone bill has increased drastically. John suspects that the company's phone system has been cracked by a malicious hacker. Which attack is used by malicious hackers to crack the phone system? A. Man-in-the-middle attack B. Sequence++ attack C. War dialing D. Phreaking

Answer: D Question: 5 Mark works as an Assistant for InfoTech Inc. He is using Microsoft Outlook 2007. He is going for technical training for one week starting from 17th October, 2007. He will leave at 9:00 AM on 17th October and come back at 8:00 PM on 24th October. He wants to ensure that all his colleagues receive the following message when he is not in office: Dear Sender, Thank you for your email. I am currently out of office for training. However, I will try to respond to your message as soon as I can. Please expect a delay in my response. Best Regards Mark In order to accomplish the task, Mark has to use the Out-of-Office Assistant tool. Take the

http://www.examkill.com/112-12.html

Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper

3


appropriate steps in the following dialog box to accomplish the task.

A.

http://www.examkill.com/112-12.html

Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper

4


Answer: A Question: 6 You work as a Desktop Technician for Umbrella Inc. The company has a Windows-based network. You receive an e-mail from the network administrator's e-mail ID asking you to provide your password so that he can make changes to your profile. You suspect that someone is trying to hack your password after you have confirmed that the network administrator did not send any such type of e-mail. Which of the following types of attacks have been executed? Each correct answer represents a part of the solution. Choose all that apply. A. Buffer-overflow attack B. Zero-day attack C. Social engineering D. E-mail spoofing

Answer: C,D Question: 7 Which of the following root keys stores information about hardware configurations and applications information that pertains to the computer in the registry of Windows XP?

http://www.examkill.com/112-12.html

Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper

5


A. HKEY CLASSES ROOT B. HKEY CURRENT USER C. HKEY USERS D. HKEY LOCAL MACHINE E. HKEY CURRENT CONFIG

Answer: D Question: 8 You work as a Data Helpdesk Technician for Bluewells Inc. The company has a Windows-based network. You use Microsoft Outlook as the default mail client for accessing e-mails. You have given your e-mail address on the Web for receiving information on new technologies. You start receiving unwanted e-mail from various websites after registering. Which of the following terms refer to such types of unwanted email? Each correct answer represents a complete solution. Choose all that apply. A. Botnet B. Zombie C. Junk e-mail D. Spam

Answer: C,D Question: 9 You work as a Desktop Technician for DataSoft Inc. Due to a Trojan attack, your computer system cannot open in normal mode and GUI safe mode. You have some important text files in the C drive in a folder named impdoc. You want to save these important files to the F drive of the hard disk. To accomplish the task, you run the system in safe mode with the command prompt. Which of the following commands will you run to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply. A. copy *.txt f: B. cd impdoc C. copy *.* f: D. md E. copy *.doc f: F. cd\

Answer: A,B,F Question: 10

http://www.examkill.com/112-12.html

Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper

6


You work as a Desktop Technician for NetPerfect Inc. The company has a Windows-based network.You have some important MS-Word files which you want to protect from others. What will you do to protect these files? Each correct answer represents a complete solution. Choose all that apply. A. Set the extension of the files as .pdf. B. Put a password to modify the files. C. Put a password to open the files. D. Hide the files.

Answer: B,C,D Question: 11 From the TreeView window, select the various cybercrimes and place them under their respective categories.

A.

http://www.examkill.com/112-12.html

Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper

7


Answer: A Question: 12 You work as a computer operator for BlueWells Inc. The company has a Windows-based network. You find out that someone has manipulated your email account, as some of your mails have been deleted. You suspect that your password has been hacked by someone. You inform about this to Mark, who is a Security Administrator. After diagnosing your system, Mark finds a log file that contains lots of text including username and password. Mark tells you that someone has installed software on your system that is recording all the keyboard strokes in a predefined log file. Which of the following software is Mark discussing about? A. Keylogger B. Adware C. Anti-Virus D. Spyware

Answer: A Question: 13

http://www.examkill.com/112-12.html

Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper

8


Maria works as a Desktop Technician for PassGuide Inc. She has received an e-mail from the MN Compensation Office with the following message: Dear Sir/Madam, My name is Edgar Rena, the director of compensation here at the MN Compensation Office in Chicago. We receive so many complaints about fraudulent activities that have been taking place in your region for the past few years. Due to the high volume loss of money, the MN compensation department has had an agreement with the appropriate authority to compensate each victim with a sum of USD$500,000.00. You were selected among the list of people to be paid this sum. To avoid any imperative mood by intending scammers, your payment has been transmuted into an International bank draft which can be cashed at any local bank in your country. Please fill the below details and send it to our secretary for your compensation bank draft. Full name: ______ Address: ________ Tel: ____________ Fill & Send to: Dr. Michael Brown MN Compensation Office, IL Tel: +1-866-233-8434 Email: micbrown@live.com Further instructions shall be given to you by our secretary as soon as you contact him. To avoid losing your compensation, you are requested to pay the sum of $350 for Insurance Premium to our secretary. Thanks and God bless. If Maria replies to this mail, which of the following attacks may she become vulnerable to? A. Phishing attack B. Mail bombing C. CookieMonster attack D. SYN attack

Answer: A Question: 14 John works as a professional Ethical Hacker for SecureEnet Inc. The company has a Windows-based network. All client computers run on Windows XP. A project has been assigned to John to investigate about the open ports responsible for various malicious attacks on the network. John wants to use the DOS command-line utility to find out the open ports. Which of the following DOS commands will John use to accomplish the task? A. netstat B. nslookup C. tracert and pathping D. nbtstat

Answer: A Question: 15 John works as a Security Administrator for NetPerfect Inc. The company has a Windows-based network. The company uses Internet Explorer 8 as its Web browser. John has been assigned a project to check the Internet Explorer security settings. During the analysis, he finds that the users need to visit some insecure Web sites often. John wants to provide secure access to these insecure Web sites with some special security settings. What will he do to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

http://www.examkill.com/112-12.html

Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper

9


A. Bookmark the Web sites. B. Use InPrivate browsing. C. Enable Pop-up blocker. D. Add these Web sites to the restricted site list.

Answer: B,C,D Question: 16 Which of the following statements is true about vulnerability? A. It is a password cracking algorithm. B. It is the weakness of any programming code. C. It is a virus. D. It is an exploit.

Answer: B Question: 17 Which of the following attacks is designed to deduce the brand and/or version of an operating system or application? A. Vulnerability assessment B. Port scanning C. Banner grabbing D. OS fingerprinting

Answer: C Question: 18 Which of the following computer crimes occurs mostly according to the CSI/FBI computer crime and security survey? A. Virus attacks B. Theft of proprietary information C. Sabotage of data and/or network D. Unauthorized access by insiders

Answer: A Question: 19

http://www.examkill.com/112-12.html

Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper

10


Which of the following agencies is responsible for handling computer crimes in the United States? A. The Federal Bureau of Investigation (FBI) and the Secret Service B. The FBI only C. The Central Intelligence Agency (CIA) D. The National Security Agency (NSA)

Answer: A Question: 20 All of the following are computer viruses except for which one? A. Code red B. Sircam C. Nimda D. Sniffer

Answer: D

http://www.examkill.com/112-12.html

Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper

11


Eccouncil 112-12

Security5 Certification

http://www.examkill.com/112-12.html Click the link below to buy full version as Low as $39

We also provide PDF Training Material for:

Hot Exam 650-987

70-416

150-230

150-420

70-332

70-331

70-689

NS0-155

70-412

LOT-441

CUR-009

70-341

70-342

000-N37

000-N40

70-410

70-415

CCD-410

CCD-470

70-620

HP2-E53

00M-662

HP2-E47

CQE

www.examkill.com

PEGACLSA_62V2 HP2-E49 MB7-701

70-323

http://www.examkill.com/112-12.html

Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper

12


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.