Question 37

How does a denial-of-service attack work?

Correct Answer:A

Question 38

In the field of cryptanalysis, what is meant by a “rubber-hose” attack?

Correct Answer:C

Question 39

Yancey is a network security administrator for a large electric company. This company provides power for over 100, 000 people in Las Vegas. Yancey has worked for his company for over 15 years and has become very successful. One day, Yancey comes in to work and finds out that the company will be downsizing and he will be out of a job in two weeks. Yancey is very angry and decides to place logic bombs, viruses, Trojans, and backdoors all over the network to take down the company once he has left. Yancey does not care if his actions land him in jail for 30 or more years, he just wants the company to pay for what they are doing to him.
What would Yancey be considered?

Correct Answer:A

Question 40

Study the following log extract and identify the attack.
312-50v11 dumps exhibit

Correct Answer:D

Question 41

In an internal security audit, the white hat hacker gains control over a user account and attempts to acquire access to another account's confidential files and information. How can he achieve this?

Correct Answer:A

Question 42

John the Ripper is a technical assessment tool used to test the weakness of which of the following?

Correct Answer:A

START 312-50v11 EXAM