Free 312-50v11 Exam Dumps

Question 6

How is the public key distributed in an orderly, controlled fashion so that the users can be sure of the sender’s identity?

Correct Answer:D

Question 7

The tools which receive event logs from servers, network equipment, and applications, and perform analysis and correlation on those logs, and can generate alarms for security relevant issues, are known as what?

Correct Answer:D

Question 8

What is the purpose of DNS AAAA record?

Correct Answer:D

Question 9

What hacking attack is challenge/response authentication used to prevent?

Correct Answer:A

Question 10

You are performing a penetration test for a client and have gained shell access to a Windows machine on the internal network. You intend to retrieve all DNS records for the internal domain, if the DNS server is at 192.168.10.2 and the domain name is abccorp.local, what command would you type at the nslookup prompt to attempt a zone transfer?

Correct Answer:B