Download Ec-council.Examsheets.312-50.v2014-02-04.by.Batista

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts

Computer and network surveillance wikipedia, lookup

Computer security compromised by hardware failure wikipedia, lookup

Transcript
C.
D.
E.
F.
MAC flooding
SYN flood
Reverse smurf attack
ARP broadcasting
Correct Answer: ABC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 477
A newly discovered flaw in a software application would be considered which kind of security vulnerability?
A.
B.
C.
D.
Input validation flaw
HTTP header injection vulnerability
0-day vulnerability
Time-to-check to time-to-use flaw
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 478
What are the three types of authentication?
A.
B.
C.
D.
Something you: know,remember,prove
Something you: have,know,are
Something you: show,prove,are
Something you: show,have,prove
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 479
What are the three types of compliance that the Open Source Security Testing Methodology Manual
(OSSTMM) recognizes?
A.
B.
C.
D.
Legal,performance,audit
Audit,standards based,regulatory
Contractual,regulatory,industry
Legislative,contractual,standards based
Correct Answer: D
Section: (none)
Explanation