This page was exported from Braindump2go Free PDF&VCE Dumps Download - ExamCollection [ ] Export date:Thu Nov 21 3:29:44 2019 / +0000 GMT ___________________________________________________ Title: [July-2017-New]Braindump2go 312-50v9 PDF and VCE Dumps 589q Free Offered[91-100] --------------------------------------------------- 2017 July New 312-50v9 Exam Dumps with PDF and VCE Free Updated in Today! 1.|2017 New 312-50v9 Exam Dumps (VCE & PDF) 589Q&As Download: 2.|2017 New 312-50v9 Exam Questions & Answers Download: QUESTION 91When using Wireshark to acquire packet capture on a network, which device would enable the capture of all traffic on the wire? A.    Network tapB.    Layer 3 switchC.    Network bridgeD.    Application firewall Answer: A QUESTION 92Which of the following programming languages is most vulnerable to buffer overflow attacks? A.    PerlB.    C++C.    PythonD.    Java Answer: B QUESTION 93Smart cards use which protocol to transfer the certificate in a secure manner? A.    Extensible Authentication Protocol (EAP)B.    Point to Point Protocol (PPP)C.    Point to Point Tunneling Protocol (PPTP)D.    Layer 2 Tunneling Protocol (L2TP) Answer: A QUESTION 94Which of the following is a hashing algorithm? A.    MD5B.    PGPC.    DESD.    ROT13 Answer: A QUESTION 95Which of the following problems can be solved by using Wireshark? A.    Tracking version changes of source codeB.    Checking creation dates on all webpages on a serverC.    Resetting the administrator password on multiple systemsD.    Troubleshooting communication resets between two systems Answer: D QUESTION 96What is the correct PCAP filter to capture all TCP traffic going to or from host on port 25? A.    tcp.src == 25 and ==    host    port 25 and host    tcp.port == 25 and == Answer: D QUESTION 97Which tool would be used to collect wireless packet data? A.    NetStumblerB.    John the RipperC.    NessusD.    Netcat Answer: A QUESTION 98Which of the following is an example of two factor authentication? A.    PIN Number and Birth DateB.    Username and PasswordC.    Digital Certificate and Hardware TokenD.    Fingerprint and Smartcard ID Answer: D QUESTION 99Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process. Which of the following is the correct bit size of the Diffie-Hellman (DH) group 5? A.    768 bit keyB.    1025 bit keyC.    1536 bit keyD.    2048 bit key Answer: C QUESTION 100After gaining access to the password hashes used to protect access to a web based application, knowledge of which cryptographic algorithms would be useful to gain access to the application? A.    SHA1B.    Diffie-HelmanC.    RSAD.    AES Answer: A !!!RECOMMEND!!! 1.|2017 New 312-50v9 Exam Dumps (VCE & PDF) 589Q&As Download: 2.|2017 New 312-50v9 Study Guide Video: YouTube Video: --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2017-07-10 01:28:27 Post date GMT: 2017-07-10 01:28:27 Post modified date: 2017-07-10 01:28:27 Post modified date GMT: 2017-07-10 01:28:27 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from