Free 312-50v13 Exam Braindumps (page: 2)

Page 1 of 79

In this form of encryption algorithm, every individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?

  1. IDEA
  2. Triple Data Encryption Standard
  3. AES
  4. MD5 encryption algorithm

Answer(s): B



John is investigating web-application firewall logs and observers that someone is attempting to inject the following:



What type of attack is this?

  1. SQL injection
  2. Buffer overflow
  3. CSRF
  4. XSS

Answer(s): B



John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization.

Which of the following attack techniques is used by John?

  1. Insider threat
  2. Diversion theft
  3. Spear-phishing sites
  4. Advanced persistent threat

Answer(s): D



You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?

  1. nmap -A - Pn
  2. nmap -sP -p-65535 -T5
  3. nmap -sT -O -T0
  4. nmap -A --host-timeout 99 -T1

Answer(s): C






Post your Comments and Discuss EC-Council 312-50v13 exam with other Community members:

312-50v13 Exam Discussions & Posts