Free 312-50v13 Exam Braindumps (page: 23)

Page 22 of 79

Abel, a cloud architect, uses container technology to deploy applications/software including all its dependencies, such as libraries and configuration files, binaries, and other resources that run independently from other processes in the cloud environment. For the containerization of applications, he follows the five-tier container technology architecture. Currently, Abel is verifying and validating image contents, signing images, and sending them to the registries.

Which of the following tiers of the container technology architecture is Abel currently working in?

  1. Tier-1: Developer machines
  2. Tier-2: Testing and accreditation systems
  3. Tier-3: Registries
  4. Tier-4: Orchestrators

Answer(s): C



Henry is a cyber security specialist hired by BlackEye – Cyber Security Solutions. He was tasked with discovering the operating system (OS) of a host. He used the Unicornscan tool to discover the OS of the target system. As a result, he obtained a TTL value, which indicates that the target system is running a Windows OS.

Identify the TTL value Henry obtained, which indicates that the target OS is Windows.

  1. 128
  2. 255
  3. 64
  4. 138

Answer(s): A



Daniel is a professional hacker who is attempting to perform an SQL injection attack on a target website, www.moviescope.com. During this process, he encountered an IDS that detects SQL injection attempts based on predefined signatures. To evade any comparison statement, he attempted placing characters such as “’or ‘1’=‘1’” in any basic injection statement such as “or 1=1.”

Identify the evasion technique used by Daniel in the above scenario.

  1. Char encoding
  2. IP fragmentation
  3. Variation
  4. Null byte

Answer(s): C



SQL injection (SQLi) attacks attempt to inject SQL syntax into web requests, which may bypass authentication and allow attackers to access and/or modify data attached to a web application.

Which of the following SQLi types leverages a database server’s ability to make DNS requests to pass data to an attacker?

  1. In-band SQLi
  2. Union-based SQLi
  3. Out-of-band SQLi
  4. Time-based blind SQLi

Answer(s): C






Post your Comments and Discuss EC-Council 312-50v13 exam with other Community members:

312-50v13 Exam Discussions & Posts