Free 312-50 Exam Dumps

Question 156

- (Topic 9)
Jack Hacker wants to break into Brown Co.'s computers and obtain their secret double fudge cookie recipe. Jack calls Jane, an accountant at Brown Co., pretending to be an administrator from Brown Co. Jack tells Jane that there has been a problem with some accounts and asks her to tell him her password 'just to double check our records'. Jane believes that Jack is really an administrator, and tells him her password. Jack now has a user name and password, and can access Brown Co.'s computers, to find the cookie recipe. This is an example of what kind of attack?

Correct Answer:B
This is a typical case of pretexting. Pretexting is the act of creating and using an invented scenario (the pretext) to persuade a target to release information or perform an action and is usually done over the telephone.

Question 157

- (Topic 23)
Jayden is a network administrator for her company. Jayden wants to prevent MAC spoofing on all the Cisco switches in the network. How can she accomplish this?

Correct Answer:D

Question 158

- (Topic 8)
A Buffer Overflow attack involves:

Correct Answer:D
B is a denial of service. By flooding the data buffer in an application with trash you could get access to write in the code segment in the application and that way insert your own code.

Question 159

- (Topic 15)
Why do you need to capture five to ten million packets in order to crack WEP with AirSnort?

Correct Answer:C
Since the summer of 2001, WEP cracking has been a trivial but time consuming process. A few tools, AirSnort perhaps the most famous, that implement the Fluhrer-Mantin-Shamir (FMS) attack were released to the security community -- who until then were aware of the problems with WEP but did not have practical penetration testing
tools. Although simple to use, these tools require a very large number of packets to be gathered before being able to crack a WEP key. The AirSnort web site estimates the total number of packets at five to ten million, but the number actually required may be higher than you think.

Question 160

- (Topic 3)
Exhibit:
312-50 dumps exhibit
Please study the exhibit carefully.
Which Protocol maintains the communication on that way?

Correct Answer:C
A TCP connection is always initiated with the 3-way handshake, which establishes and negotiates the actual connection over which data will be sent.