Free 312-50v11 Exam Dumps

Question 66

What kind of detection techniques is being used in antivirus softwares that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it's made on the premiers environment

Correct Answer:A

Question 67

The network team has well-established procedures to follow for creating new rules on the firewall. This includes having approval from a manager prior to implementing any new rules. While reviewing the firewall configuration, you notice a recently implemented rule but cannot locate manager approval for it. What would be a good step to have in the procedures for a situation like this?

Correct Answer:D

Question 68

Which of the following tools can be used to perform a zone transfer?

Correct Answer:ACDE

Question 69

Todd has been asked by the security officer to purchase a counter-based authentication system. Which of the following best describes this type of system?

Correct Answer:C

Question 70

During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a Demilitarized Zone (DMZ) and a second DNS server on the internal network.
What is this type of DNS configuration commonly called?

Correct Answer:D