Security5 Certification

Page 1

112-12

Eccouncil

Security5 Certification Click the link below to buy full version as Low as $25 http://www.examkill.com/112-12.html

ExamKill is team of experienced and educated professionals working day and night to develop preparation material for different fields in IT. These industries are including HP, IBM, Comptia, Orcale, Apple, Adobe, Nortel, Novell, Checkpoint etc with the following features.

Free Samples:

Free samples download are available for almost every product to check before

buy.

Complete Course Coverage: Experienced professionals are making sure to cover complete course so that you pass final exam.

Updated Material: Preparation material is updated and new; you can compare us with other providers in the same industry.

Privacy Protection:

Examkill team makes sure not to reveal your private information

including your credit card and other secret information.

Excellent Customer Support: You will get reply from examkill support within 8 hours for all your questions/concerns about anything.

www.examkill.com


Question: 1 You work as a Security Administrator for Net Perfect Inc. The company has a Windows-based network. The employees use Internet Explorer for Internet surfing. You want to block access to the vulnerable sites from the internal network of the company. To accomplish the task, you need to configure some security settings for Internet Explorer. Which of the following features of Internet Explorer do you need to configure? A. Internet Explorer Compatibility Evaluator B. Pop-up blocker C. InPrivate Browsing D. Content Advisor

Answer: D Question: 2 You work as a Security Administrator for BlueWells Inc. The company has a Windows-based network.You have been assigned a project that aims to strengthen the security of the company. You want to perform system hardening. Which of the following steps can you take to accomplish the task? Each correct answer represents a complete solution. Choose all that apply. A. Enabling the guest account B. Installing anti-virus and anti-spyware software C. Enabling automatic updates to ensure that the operating system is patched and up-to-date D. Disabling auditing E. Disabling the guest account F. Removing and uninstalling unnecessary programs G. Enabling auditing

Answer: B,C,E,F,G

http://www.examkill.com/112-12.html

Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper

2


Question: 3 Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses 'Faulkner' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew's password? Each correct answer represents a complete solution. Choose all that apply. A. Dictionary-based attack B. Social engineering C. Zero-day attack D. Denial-of-service (DoS) attack E. Brute force attack F. Password guessing G. Buffer-overflow attack H. Rainbow attack

Answer: A,B,E,F,H Question: 4 John works as a Network Security Administrator for NetPerfect Inc. The manager of the company has told John that the company's phone bill has increased drastically. John suspects that the company's phone system has been cracked by a malicious hacker. Which attack is used by malicious hackers to crack the phone system? A. Man-in-the-middle attack B. Sequence++ attack C. War dialing D. Phreaking

Answer: D

http://www.examkill.com/112-12.html

Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper

3


Question: 5 Mark works as an Assistant for InfoTech Inc. He is using Microsoft Outlook 2007. He is going for technical training for one week starting from 17th October, 2007. He will leave at 9:00 AM on 17th October and come back at 8:00 PM on 24th October. He wants to ensure that all his colleagues receive the following message when he is not in office: Dear Sender, Thank you for your email. I am currently out of office for training. However, I will try to respond to your message as soon as I can. Please expect a delay in my response. Best Regards Mark In order to accomplish the task, Mark has to use the Out-of-Office Assistant tool. Take the appropriate steps in the following dialog box to accomplish the task.

A.

http://www.examkill.com/112-12.html

Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper

4


Answer: A Question: 6 You work as a Desktop Technician for Umbrella Inc. The company has a Windows-based network. You receive an e-mail from the network administrator's e-mail ID asking you to provide your password so that he can make changes to your profile. You suspect that someone is trying to hack your password after you have confirmed that the network administrator did not send any such type of e-mail. Which of the following types of attacks have been executed? Each correct answer represents a part of the solution. Choose all that apply. A. Buffer-overflow attack B. Zero-day attack C. Social engineering D. E-mail spoofing

Answer: C,D

http://www.examkill.com/112-12.html

Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper

5


Question: 7 Which of the following root keys stores information about hardware configurations and applications information that pertains to the computer in the registry of Windows XP? A. HKEY CLASSES ROOT B. HKEY CURRENT USER C. HKEY USERS D. HKEY LOCAL MACHINE E. HKEY CURRENT CONFIG

Answer: D Question: 8 You work as a Data Helpdesk Technician for Bluewells Inc. The company has a Windows-based network. You use Microsoft Outlook as the default mail client for accessing e-mails. You have given your e-mail address on the Web for receiving information on new technologies. You start receiving unwanted e-mail from various websites after registering. Which of the following terms refer to such types of unwanted email? Each correct answer represents a complete solution. Choose all that apply. A. Botnet B. Zombie C. Junk e-mail D. Spam

Answer: C,D

http://www.examkill.com/112-12.html

Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper

6


Question: 9 You work as a Desktop Technician for DataSoft Inc. Due to a Trojan attack, your computer system cannot open in normal mode and GUI safe mode. You have some important text files in the C drive in a folder named impdoc. You want to save these important files to the F drive of the hard disk. To accomplish the task, you run the system in safe mode with the command prompt. Which of the following commands will you run to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply. A. copy *.txt f: B. cd impdoc C. copy *.* f: D. md E. copy *.doc f: F. cd\

Answer: A,B,F Question: 10 You work as a Desktop Technician for NetPerfect Inc. The company has a Windows-based network.You have some important MS-Word files which you want to protect from others. What will you do to protect these files? Each correct answer represents a complete solution. Choose all that apply. A. Set the extension of the files as .pdf. B. Put a password to modify the files. C. Put a password to open the files. D. Hide the files.

Answer: B,C,D

http://www.examkill.com/112-12.html

Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper

7


Eccouncil

112-12

Security5 Certification

Click the link below to buy full version as Low as $25

http://www.examkill.com/112-12.html

We also provide PDF Training Material for: Hot Exam 1D0-635

1D0-571

1D0-435

ST0-096

1D0-476

1D0-430

1D0-525

ST0-12W

1D0-541

1D0-520

1D0-460

ST0-29B

1D0-437

1D0-450

ST0-12X

250-308

1D0-442

1D0-510

ST0-91X

ST0-086

1D0-470

1D0-51A

250-401

ST0-099

1D0-51C

1D0-51B

ST0-097

ST0-270

http://www.examkill.com/112-12.html

www.examkill.com

Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper

8


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.