www.cert24.com,test dumps, practice test, pdf 312-50v7 EC-COUNCIL cert24
www.cert24.com,test dumps, practice test, pdf 312-50v7 EC-COUNCIL cert24
IT Exam,IT Certification,braindump,original questions, question pool,document, braindump, test questions, test question, dumps, test answers, cert24.com, preparation, pdf, certification questions, answers Certification, certification test, practice test, exam dumps, certification training, answers real questions
312-50v7 Ethical Hacking and Countermeasures (CEHv7) We believe in helping our customers achieve their goals. For this reason, we take great care while preparing our Questions and Answers , Core Administration. Our practice tests Administration are prepared with the help of highly professional people from the industry, so we benefit from their vast experience and knowledge.
www.cert24.com,test dumps, practice test, pdf 312-50v7 EC-COUNCIL cert24
QUESTION NO: 1
SSL has been seen as the solution to a lot of common security problems. Administrator will often time make use of SSL to encrypt communications from points A to point B. Why do you think this could be a bad idea if there is an Intrusion Detection System deployed to monitor the traffic between point A and B?
A. SSL is redundant if you already have IDS’s in place
B. SSL will trigger rules at regular interval and force the administrator to turn them off
C. SSL will slow down the IDS while it is breaking the encryption to see the packet content
D. SSL will blind the content of the packet and Intrusion Detection Systems will not be able to detect them
Answer: D
QUESTION NO: 2
Jake is a network administrator who needs to get reports from all the computer and network devices on his network. Jake wants to use SNMP but is afraid that won’t be secure since passwords and messages are in clear text. How can Jake gather network information in a secure manner?
A. He can use SNMPv3
B. Jake can use SNMPrev5
C. He can use SecWMI
D. Jake can use SecSNMP
Answer: A
QUESTION NO: 3
June, a security analyst, understands that a polymorphic virus has the ability to mutate and can change its known viral signature and hide from signature-based antivirus programs. Can June use an antivirus program in this case and would it be effective against a polymorphic virus?
A. Yes. June can use an antivirus program since it compares the parity bit of executable files to the database of known check sum counts and it is effective on a polymorphic virus
B. Yes. June can use an antivirus program since it compares the signatures of executable files to the database of known viral signatures and it is very effective against a polymorphic virus
C. No. June can’t use an antivirus program since it compares the signatures of executable files to the database of known viral signatures and in the case the polymorphic viruses cannot be detected by a signature-based anti-virus program
D. No. June can’t use an antivirus program since it compares the size of executable files to the database of known viral signatures and it is effective on a polymorphic virus
Answer: C
www.cert24.com,test dumps, practice test, pdf 312-50v7 EC-COUNCIL cert24