112-12
Eccouncil
Security5 Certification Click the link below to buy full version as Low as $25 http://www.examkill.com/112-12.html
ExamKill is team of experienced and educated professionals working day and night to develop preparation material for different fields in IT. These industries are including HP, IBM, Comptia, Orcale, Apple, Adobe, Nortel, Novell, Checkpoint etc with the following features.
Free Samples:
Free samples download are available for almost every product to check before
buy.
Complete Course Coverage: Experienced professionals are making sure to cover complete course so that you pass final exam.
Updated Material: Preparation material is updated and new; you can compare us with other providers in the same industry.
Privacy Protection:
Examkill team makes sure not to reveal your private information
including your credit card and other secret information.
Excellent Customer Support: You will get reply from examkill support within 8 hours for all your questions/concerns about anything.
www.examkill.com
Question: 1 You work as a Security Administrator for Net Perfect Inc. The company has a Windows-based network. The employees use Internet Explorer for Internet surfing. You want to block access to the vulnerable sites from the internal network of the company. To accomplish the task, you need to configure some security settings for Internet Explorer. Which of the following features of Internet Explorer do you need to configure? A. Internet Explorer Compatibility Evaluator B. Pop-up blocker C. InPrivate Browsing D. Content Advisor
Answer: D Question: 2 You work as a Security Administrator for BlueWells Inc. The company has a Windows-based network.You have been assigned a project that aims to strengthen the security of the company. You want to perform system hardening. Which of the following steps can you take to accomplish the task? Each correct answer represents a complete solution. Choose all that apply. A. Enabling the guest account B. Installing anti-virus and anti-spyware software C. Enabling automatic updates to ensure that the operating system is patched and up-to-date D. Disabling auditing E. Disabling the guest account F. Removing and uninstalling unnecessary programs G. Enabling auditing
Answer: B,C,E,F,G
http://www.examkill.com/112-12.html
Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper
2
Question: 3 Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses 'Faulkner' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew's password? Each correct answer represents a complete solution. Choose all that apply. A. Dictionary-based attack B. Social engineering C. Zero-day attack D. Denial-of-service (DoS) attack E. Brute force attack F. Password guessing G. Buffer-overflow attack H. Rainbow attack
Answer: A,B,E,F,H Question: 4 John works as a Network Security Administrator for NetPerfect Inc. The manager of the company has told John that the company's phone bill has increased drastically. John suspects that the company's phone system has been cracked by a malicious hacker. Which attack is used by malicious hackers to crack the phone system? A. Man-in-the-middle attack B. Sequence++ attack C. War dialing D. Phreaking
Answer: D
http://www.examkill.com/112-12.html
Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper
3
Question: 5 Mark works as an Assistant for InfoTech Inc. He is using Microsoft Outlook 2007. He is going for technical training for one week starting from 17th October, 2007. He will leave at 9:00 AM on 17th October and come back at 8:00 PM on 24th October. He wants to ensure that all his colleagues receive the following message when he is not in office: Dear Sender, Thank you for your email. I am currently out of office for training. However, I will try to respond to your message as soon as I can. Please expect a delay in my response. Best Regards Mark In order to accomplish the task, Mark has to use the Out-of-Office Assistant tool. Take the appropriate steps in the following dialog box to accomplish the task.
A.
http://www.examkill.com/112-12.html
Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper
4
Answer: A Question: 6 You work as a Desktop Technician for Umbrella Inc. The company has a Windows-based network. You receive an e-mail from the network administrator's e-mail ID asking you to provide your password so that he can make changes to your profile. You suspect that someone is trying to hack your password after you have confirmed that the network administrator did not send any such type of e-mail. Which of the following types of attacks have been executed? Each correct answer represents a part of the solution. Choose all that apply. A. Buffer-overflow attack B. Zero-day attack C. Social engineering D. E-mail spoofing
Answer: C,D
http://www.examkill.com/112-12.html
Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper
5
Question: 7 Which of the following root keys stores information about hardware configurations and applications information that pertains to the computer in the registry of Windows XP? A. HKEY CLASSES ROOT B. HKEY CURRENT USER C. HKEY USERS D. HKEY LOCAL MACHINE E. HKEY CURRENT CONFIG
Answer: D Question: 8 You work as a Data Helpdesk Technician for Bluewells Inc. The company has a Windows-based network. You use Microsoft Outlook as the default mail client for accessing e-mails. You have given your e-mail address on the Web for receiving information on new technologies. You start receiving unwanted e-mail from various websites after registering. Which of the following terms refer to such types of unwanted email? Each correct answer represents a complete solution. Choose all that apply. A. Botnet B. Zombie C. Junk e-mail D. Spam
Answer: C,D
http://www.examkill.com/112-12.html
Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper
6
Question: 9 You work as a Desktop Technician for DataSoft Inc. Due to a Trojan attack, your computer system cannot open in normal mode and GUI safe mode. You have some important text files in the C drive in a folder named impdoc. You want to save these important files to the F drive of the hard disk. To accomplish the task, you run the system in safe mode with the command prompt. Which of the following commands will you run to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply. A. copy *.txt f: B. cd impdoc C. copy *.* f: D. md E. copy *.doc f: F. cd\
Answer: A,B,F Question: 10 You work as a Desktop Technician for NetPerfect Inc. The company has a Windows-based network.You have some important MS-Word files which you want to protect from others. What will you do to protect these files? Each correct answer represents a complete solution. Choose all that apply. A. Set the extension of the files as .pdf. B. Put a password to modify the files. C. Put a password to open the files. D. Hide the files.
Answer: B,C,D
http://www.examkill.com/112-12.html
Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper
7
Eccouncil
112-12
Security5 Certification
Click the link below to buy full version as Low as $25
http://www.examkill.com/112-12.html
We also provide PDF Training Material for: Hot Exam 1D0-635
1D0-571
1D0-435
ST0-096
1D0-476
1D0-430
1D0-525
ST0-12W
1D0-541
1D0-520
1D0-460
ST0-29B
1D0-437
1D0-450
ST0-12X
250-308
1D0-442
1D0-510
ST0-91X
ST0-086
1D0-470
1D0-51A
250-401
ST0-099
1D0-51C
1D0-51B
ST0-097
ST0-270
http://www.examkill.com/112-12.html
www.examkill.com
Adobe Apple Cisco CompTIA HP EMC IBM Microsoft Oracle Juniper
8