Free 312-50v11 Exam Dumps

Question 106

How does a denial-of-service attack work?

Correct Answer:A

Question 107

Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students.
He identified this when the IDS alerted for malware activities in the network. What should Bob do to avoid this problem?

Correct Answer:C

Question 108

John the Ripper is a technical assessment tool used to test the weakness of which of the following?

Correct Answer:A

Question 109

An attacker attaches a rogue router in a network. He wants to redirect traffic to a LAN attached to his router as part of a man-in-the-middle attack. What measure on behalf of the legitimate admin can mitigate this attack?

Correct Answer:A

Question 110

Which of the following is an extremely common IDS evasion technique in the web world?

Correct Answer:C