This page was exported from Braindump2go Free Exam Dumps with PDF and VCE Collection [ https://www.mcitpdump.com ] Export date:Thu Apr 25 14:01:26 2024 / +0000 GMT ___________________________________________________ Title: [July-2017-New]Braindump2go Offer Free 312-50v9 Dumps PDF[121-130] --------------------------------------------------- 2017 July New 312-50v9 Exam Dumps with PDF and VCE Free Updated in www.Braindump2go.com Today! 1.|2017 New 312-50v9 Exam Dumps (VCE & PDF) 589Q&As Download:https://www.braindump2go.com/312-50v9.html 2.|2017 New 312-50v9 Exam Questions & Answers Download:https://drive.google.com/drive/folders/0B75b5xYLjSSNWml5eng1ZVh6aHM?usp=sharing QUESTION 121Which of the following does proper basic configuration of snort as a network intrusion detection system require? A.    Limit the packets captured to the snort configuration file.B.    Capture every packet on the network segment.C.    Limit the packets captured to a single segment.D.    Limit the packets captured to the /var/log/snort directory. Answer: A QUESTION 122How is sniffing broadly categorized? A.    Active and passiveB.    Broadcast and unicastC.    Unmanaged and managedD.    Filtered and unfiltered Answer: A QUESTION 123What are the three types of authentication? A.    Something you: know, remember, proveB.    Something you: have, know, areC.    Something you: show, prove, areD.    Something you: show, have, prove Answer: B QUESTION 124The use of technologies like IPSec can help guarantee the following: authenticity, integrity, confidentiality and A.    non-repudiation.B.    operability.C.    security.D.    usability. Answer: A QUESTION 125What is the main disadvantage of the scripting languages as opposed to compiled programming languages? A.    Scripting languages are hard to learn.B.    Scripting languages are not object-oriented.C.    Scripting languages cannot be used to create graphical user interfaces.D.    Scripting languages are slower because they require an interpreter to run the code. Answer: D QUESTION 126A botnet can be managed through which of the following? A.    IRCB.    E-MailC.    Linkedin and FacebookD.    A vulnerable FTP server Answer: A QUESTION 127Fingerprinting VPN firewalls is possible with which of the following tools? A.    Angry IPB.    NiktoC.    Ike-scanD.    Arp-scan Answer: C QUESTION 128What is a successful method for protecting a router from potential smurf attacks? A.    Placing the router in broadcast modeB.    Enabling port forwarding on the routerC.    Installing the router outside of the network's firewallD.    Disabling the router from accepting broadcast ping messages Answer: D QUESTION 129Which of the following is optimized for confidential communications, such as bidirectional voice and video? A.    RC4B.    RC5C.    MD4D.    MD5 Answer: A QUESTION 130Advanced encryption standard is an algorithm used for which of the following? A.    Data integrityB.    Key discoveryC.    Bulk data encryptionD.    Key recovery Answer: C !!!RECOMMEND!!! 1.|2017 New 312-50v9 Exam Dumps (VCE & PDF) 589Q&As Download:https://www.braindump2go.com/312-50v9.html 2.|2017 New 312-50v9 Study Guide Video: YouTube Video: YouTube.com/watch?v=U8B7_OOPx00 --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2017-07-10 03:18:14 Post date GMT: 2017-07-10 03:18:14 Post modified date: 2017-07-10 03:18:14 Post modified date GMT: 2017-07-10 03:18:14 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com