Free 312-50v13 Exam Braindumps (page: 12)

Page 11 of 79

John wants to send Marie an email that includes sensitive information, and he does not trust the network that he is connected to. Marie gives him the idea of using PGP. What should John do to communicate correctly using this type of encryption?

  1. Use his own private key to encrypt the message.
  2. Use his own public key to encrypt the message.
  3. Use Marie’s private key to encrypt the message.
  4. Use Marie’s public key to encrypt the message.

Answer(s): D



In the Common Vulnerability Scoring System (CVSS) v3.1 severity ratings, what range does medium vulnerability fall in?

  1. 4.0-6.0
  2. 3.9-6.9
  3. 3.0-6.9
  4. 4.0-6.9

Answer(s): D



Bill is a network administrator. He wants to eliminate unencrypted traffic inside his company’s network. He decides to setup a SPAN port and capture all traffic to the datacenter. He immediately discovers unencrypted traffic in port UDP 161.

What protocol is this port using and how can he secure that traffic?

  1. RPC and the best practice is to disable RPC completely.
  2. SNMP and he should change it to SNMP V3.
  3. SNMP and he should change it to SNMP V2, which is encrypted.
  4. It is not necessary to perform any actions, as SNMP is not carrying important information.

Answer(s): B



Consider the following Nmap output:



What command-line parameter could you use to determine the type and version number of the web server?

  1. -sV
  2. -sS
  3. -Pn
  4. -V

Answer(s): A






Post your Comments and Discuss EC-Council 312-50v13 exam with other Community members:

312-50v13 Exam Discussions & Posts