Free 312-50v13 Exam Braindumps (page: 27)

Page 26 of 79

Alice needs to send a confidential document to her coworker, Bryan. Their company has public key infrastructure set up. Therefore, Alice both encrypts the message and digitally signs it. Alice uses _______________ to encrypt the message, and Bryan uses _______________ to confirm the digital signature.

  1. Bryan’s public key; Bryan’s public key
  2. Alice’s public key; Alice’s public key
  3. Bryan’s private key; Alice’s public key
  4. Bryan’s public key; Alice’s public key

Answer(s): D



What is the file that determines the basic configuration (specifically activities, services, broadcast receivers, etc.) in an Android application?

  1. AndroidManifest.xml
  2. classes.dex
  3. APK.info
  4. resources.asrc

Answer(s): C



Mason, a professional hacker, targets an organization and spreads Emotet malware through malicious script. After infecting the victim's device, Mason further used Emotet to spread the infection across local networks and beyond to compromise as many machines as possible. In this process, he used a tool, which is a self-extracting RAR file, to retrieve information related to network resources such as writable share drives.

What is the tool employed by Mason in the above scenario?

  1. NetPass.exe
  2. Outlook scraper
  3. WebBrowserPassView
  4. Credential enumerator

Answer(s): D



Which of the following Bluetooth hacking techniques refers to the theft of information from a wireless device through Bluetooth?

  1. Bluesmacking
  2. Bluesnarfing
  3. Bluejacking
  4. Bluebugging

Answer(s): B






Post your Comments and Discuss EC-Council 312-50v13 exam with other Community members:

312-50v13 Exam Discussions & Posts