Free 312-50v11 Exam Braindumps (page: 9)

Page 9 of 127

Which Intrusion Detection System is best applicable for large environments where critical assets on the network need extra scrutiny and is ideal for observing sensitive network segments?

  1. Honeypots
  2. Firewalls
  3. Network-based intrusion detection system (NIDS)
  4. Host-based intrusion detection system (HIDS)

Answer(s): C



The collection of potentially actionable, overt, and publicly available information is known as

  1. Open-source intelligence
  2. Real intelligence
  3. Social intelligence
  4. Human intelligence

Answer(s): A



What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?

  1. Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.
  2. Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.
  3. Symmetric encryption allows the server to security transmit the session keys out-of-band.
  4. Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.

Answer(s): A



The change of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from the last backup to the new hard disk. The recovery person earns $10/hour. Calculate the SLE, ARO, and ALE. Assume the EF = 1(100%). What is the closest approximate cost of this replacement and recovery operation per year?

  1. $1320
  2. $440
  3. $100
  4. $146

Answer(s): D






Post your Comments and Discuss EC-Council 312-50v11 exam with other Community members:

312-50v11 Exam Discussions & Posts