[Free] 2019(Nov) EnsurePass ECCouncil 712-50 Dumps with VCE and PDF 261-270

Get Full Version of the Exam
http://www.EnsurePass.com/712-50.html

Question No.261

What is the term describing the act of inspecting all real-time Internet traffic (i.e., packets) traversing a major Internet backbone without introducing any apparent latency?

  1. Traffic Analysis

  2. Deep-Packet inspection

  3. Packet sampling

  4. Heuristic analysis

Correct Answer: B

Question No.262

The process of identifying and classifying assets is typically included in the

  1. Threat analysis process

  2. Asset configuration management process

  3. Business Impact Analysis

  4. Disaster Recovery plan

Correct Answer: C

Question No.263

As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.

  1. Covering tracks

  2. Scanning and enumeration

  3. Maintaining Access

  4. Reconnaissance

  5. Gaining Access

A. 4, 2, 5, 3, 1

B. 2, 5, 3, 1, 4

C. 4, 5, 2, 3, 1

D. 4, 3, 5, 2, 1

Correct Answer: A

Question No.264

Which of the following statements about Encapsulating Security Payload (ESP) is true?

  1. It is an IPSec protocol.

  2. It is a text-based communication protocol.

  3. It uses TCP port 22 as the default port and operates at the application layer.

  4. It uses UDP port 22

Correct Answer: A

Question No.265

A customer of a bank has placed a dispute on a payment for a credit card account. The banking system uses digital signatures to safeguard the integrity of their transactions. The bank claims that the system shows proof that the customer in fact made the payment. What is this system capability commonly known as?

  1. non-repudiation

  2. conflict resolution

  3. strong authentication

  4. digital rights management

Correct Answer: A

Question No.266

Which of the following is the MAIN security concern for public cloud computing?

  1. Unable to control physical access to the servers

  2. Unable to track log on activity

  3. Unable to run anti-virus scans

  4. Unable to patch systems as needed

Correct Answer: A

Question No.267

Physical security measures typically include which of the following components?

  1. Physical, Technical, Operational

  2. Technical, Strong Password, Operational

  3. Operational, Biometric, Physical

  4. Strong password, Biometric, Common Access Card

Correct Answer: A

Question No.268

You are having a penetration test done on your company network and the leader of the team says they discovered all the network devices because no one had changed the Simple Network Management Protocol (SNMP) community strings from the defaults. Which of the following is a default community string?

  1. Execute

  2. Read

  3. Administrator

  4. Public

Correct Answer: D

Question No.269

Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?

  1. In-line hardware keyloggers don#39;t require physical access

  2. In-line hardware keyloggers don#39;t comply to industry regulations

  3. In-line hardware keyloggers are undetectable by software

  4. In-line hardware keyloggers are relatively inexpensive

Correct Answer: C

Question No.270

What type of attack requires the least amount of technical equipment and has the highest success rate?

  1. War driving

  2. Operating system attacks

  3. Social engineering

  4. Shrink wrap attack

Correct Answer: C

Get Full Version of the Exam
712-50 Dumps
712-50 VCE and PDF