Free 312-50v11 Exam Dumps

Question 61

An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?

Correct Answer:A

Question 62

What is the main security service a cryptographic hash provides?

Correct Answer:D

Question 63

PGP, SSL, and IKE are all examples of which type of cryptography?

Correct Answer:C

Question 64

Windows LAN Manager (LM) hashes are known to be weak.
Which of the following are known weaknesses of LM? (Choose three.)

Correct Answer:ABD

Question 65

Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?

Correct Answer:A