Free EC-Council 312-50v12 Exam Braindumps (page: 27)

Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students.
He identified this when the IDS alerted for malware activities in the network. What should Bob do to avoid this problem?

  1. Disable unused ports in the switches
  2. Separate students in a different VLAN
  3. Use the 802.1x protocol
  4. Ask students to use the wireless network

Answer(s): C



A company’s policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department. Using Wireshark to examine the captured traffic, which command can be used as a display filter to find unencrypted file transfers?

  1. tcp.port = = 21
  2. tcp.port = 23
  3. tcp.port = = 21 | | tcp.port = =22
  4. tcp.port ! = 21

Answer(s): A



You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration? alerttcp any any -> 192.168.100.0/24 21 (msg: ““FTP on the network!””;)

  1. A firewall IPTable
  2. FTP Server rule
  3. A Router IPTable
  4. An Intrusion Detection System

Answer(s): D



Which of the following program infects the system boot sector and the executable files at the same time?

  1. Polymorphic virus
  2. Stealth virus
  3. Multipartite Virus
  4. Macro virus

Answer(s): C






Post your Comments and Discuss EC-Council 312-50v12 exam prep with other Community members:

312-50v12 Exam Discussions & Posts