312-50v12 Exam Questions

Total 569 Questions

Last Updated Exam : 16-Dec-2024

Topic 1: Exam Pool A

In the field of cryptanalysis, what is meant by a “rubber-hose” attack?


A.

Forcing the targeted keystream through a hardware-accelerated device such as an
ASIC.


B.

A backdoor placed into a cryptographic algorithm by its creator


C.

Extraction of cryptographic secrets through coercion or torture


D.

Attempting to decrypt ciphertext by making logical assumptions about the contents of
the original plaintex





C.
  

Extraction of cryptographic secrets through coercion or torture



A powerful and often the most effective cryptanalysis method in which the
attack is directed at the most vulnerable link in the cryptosystem - the person. In this attack,
the cryptanalyst uses blackmail, threats, torture, extortion, bribery, etc. This method's main
advantage is the decryption time's fundamental independence from the volume of secret
information, the length of the key, and the cipher's mathematical strength.
The method can reduce the time to guess a password, for example, for AES, to an
acceptable level; however, it requires special authorization from the relevant regulatory
authorities. Therefore, it is outside the scope of this course and is not considered in its
practical part.

The change of a hard drive failure is once every three years. The cost to buy a new hard
drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It
will require a further 4 hours to restore the database from the last backup to the new hard
disk. The recovery person earns $10/hour. Calculate the SLE, ARO, and ALE. Assume the
EF = 1(100%). What is the closest approximate cost of this replacement and recovery
operation per year?


A.

$1320


B.

$440


C.

$100


D.

$146





D.
  

$146



Explanation: 1. AV (Asset value) = $300 + (14 * $10) = $440 - the cost of a hard drive
plus the work of a recovery person, i.e.how much would it take to replace 1 asset? 10
hours for resorting the OS and soft + 4 hours for DB restore multiplies by hourly rate of the
recovery person.
2. SLE (Single Loss Expectancy) = AV * EF (Exposure Factor) = $440 * 1 = $440
3. ARO (Annual rate of occurrence) = 1/3 (every three years, meaning the probability of
occurring during 1 years is 1/3)
4. ALE (Annual Loss Expectancy) = SLE * ARO = 0.33 * $440 = $145.2

Study the snort rule given below:

From the options below, choose the exploit against which this rule applies.


A.

WebDav


B.

SQL Slammer


C.

MS Blaster


D.

MyDoom





C.
  

MS Blaster



Why should the security analyst disable/remove unnecessary ISAPI filters?


A.

To defend against social engineering attacks


B.

To defend against webserver attacks


C.

To defend against jailbreaking


D.

To defend against jailbreaking





B.
  

To defend against webserver attacks



Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of
communication?


A.

113


B.

69


C.

123


D.

161





C.
  

123



Explanation:
https://en.wikipedia.org/wiki/Network_Time_Protocol
The Network Time Protocol (NTP) is a networking protocol for clock synchronization
between computer systems over packet-switched, variable-latency data networks.
NTP is intended to synchronize all participating computers within a few milliseconds of
Coordinated Universal Time (UTC). It uses the intersection algorithm, a modified version of
Marzullo's algorithm, to select accurate time servers and is designed to mitigate variable
network latency effects. NTP can usually maintain time to within tens of milliseconds over
the public Internet and achieve better than one millisecond accuracy in local area networks.
Asymmetric routes and network congestion can cause errors of 100 ms or more.
The protocol is usually described in terms of a client-server model but can easily be used in
peer-to-peer relationships where both peers consider the other to be a potential time
source. Implementations send and receive timestamps using the User Datagram Protocol
(UDP) on port number 123.

PGP, SSL, and IKE are all examples of which type of cryptography?


A.

Digest


B.

Secret Key


C.

Public Key


D.

Hash Algorithm





C.
  

Public Key



The “Gray-box testing” methodology enforces what kind of restriction?


A.

Only the external operation of a system is accessible to the tester.


B.

The internal operation of a system in only partly accessible to the tester


C.

Only the internal operation of a system is known to the tester.


D.

The internal operation of a system is completely known to the tester.





D.
  

The internal operation of a system is completely known to the tester.



White-box testing (also known as clear box testing, glass box testing, transparent box
testing, and structural testing) is a method of software testing that tests internal structures
or workings of an application, as opposed to its functionality (i.e. black-box testing). In
white-box testing, an internal perspective of the system, as well as programming skills, are
used to design test cases. The tester chooses inputs to exercise paths through the code
and determine the expected outputs. This is analogous to testing nodes in a circuit, e.g. incircuit
testing (ICT). White-box testing can be applied at the unit, integration and system
levels of the software testing process. Although traditional testers tended to think of whitebox
testing as being done at the unit level, it is used for integration and system testing
more frequently today. It can test paths within a unit, paths between units during
integration, and between subsystems during a system-level test. Though this method of
test design can uncover many errors or problems, it has the potential to miss
unimplemented parts of the specification or missing requirements. Where white-box testing
is design-driven,[1] that is, driven exclusively by agreed specifications of how each
component of the software is required to behave (as in DO-178C and ISO 26262
processes) then white-box test techniques can accomplish assessment for unimplemented
or missing requirements.
White-box test design techniques include the following code coverage criteria:
· Control flow testing
· Data flow testing
· Branch testing
· Statement coverage
· Decision coverage
· Modified condition/decision coverage
· Prime path testing
· Path testing

What is the role of test automation in security testing?


A.

It is an option but it tends to be very expensive.


B.

It should be used exclusively. Manual testing is outdated because of low speed and
possible test setup inconsistencies.


C.

Test automation is not usable in security due to the complexity of the tests.


D.

It can accelerate benchmark tests and repeat them with a consistent test setup. But it
cannot replace manual testing completely.





D.
  

It can accelerate benchmark tests and repeat them with a consistent test setup. But it
cannot replace manual testing completely.



As a securing consultant, what are some of the things you would recommend to a company
to ensure DNS security?


A.

Use the same machines for DNS and other applications


B.

Harden DNS servers


C.

Use split-horizon operation for DNS servers


D.

Restrict Zone transfers


E.

Have subnet diversity between DNS servers





B.
  

Harden DNS servers



C.
  

Use split-horizon operation for DNS servers



D.
  

Restrict Zone transfers



E.
  

Have subnet diversity between DNS servers



Your company performs penetration tests and security assessments for small and mediumsized
business in the local area. During a routine security assessment, you discover
information that suggests your client is involved with human trafficking.
What should you do?


A.

Confront the client in a respectful manner and ask her about the data.


B.

Copy the data to removable media and keep it in case you need it.


D.

Ignore the data and continue the assessment until completed as agreed


E.

Immediately stop work and contact the proper legal authorities.





D.
  

Ignore the data and continue the assessment until completed as agreed




Page 6 out of 57 Pages
Previous