Which of the following program infects the system boot sector and the executable files at the same time?
Answer(s): C
To determine if a software program properly handles a wide range of invalid input, a form of automated testing can be used to randomly generate invalid input in an attempt to crash the program.What term is commonly used when referring to this type of testing?
Answer(s): D
An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the network’s external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file. What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?
Answer(s): A
The Heartbleed bug was discovered in 2014 and is widely referred to under MITRE’s Common Vulnerabilities and Exposures (CVE) as CVE-2014-0160. This bug affects the OpenSSL implementation of the Transport Layer Security (TLS) protocols defined in RFC6520.What type of key does this bug leave exposed to the Internet making exploitation of any compromised system very easy?
Answer(s): B
Why should the security analyst disable/remove unnecessary ISAPI filters?
Share your comments for EC-Council 312-50v12 exam with other users:
can i belive this dump
q31 answer should be d i think
good source
question 205 answer is b