While designing a secondary data center for your company what document needs to be analyzed to determine to how much should be spent on building the data center?
A. Enterprise Risk Assessment
B. Disaster recovery strategic plan
C. Business continuity plan
D. Application mapping document
What type of attack requires the least amount of technical equipment and has the highest success rate?
A. War driving
B. Operating system attacks
C. Social engineering
D. Shrink wrap attack
SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:
A. ` o 1=1 -
B. /../../../../
C. "DROPTABLE USERNAME"
D. NOPS
Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?
A. Trusted and untrusted networks
B. Type of authentication
C. Storage encryption
D. Log retention
Which of the following is a countermeasure to prevent unauthorized database access from web applications?
A. Session encryption
B. Removing all stored procedures
C. Input sanitization
D. Library control
One of your executives needs to send an important and confidential email. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys should be used to encrypt the message?
A. Your public key
B. The recipient's private key
C. The recipient's public key
D. Certificate authority key
Which of the following strategies provides the BEST response to a ransomware attack?
A. Real-time off-site replication
B. Daily incremental backup
C. Daily full backup
D. Daily differential backup
An anonymity network is a series of?
A. Covert government networks
B. War driving maps
C. Government networks in Tora
D. Virtual network tunnels
As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.
1.Covering tracks 2.Scanning and enumeration 3.Maintaining Access 4.Reconnaissance 5.Gaining Access
A. 4, 2, 5, 3, 1
B. 2, 5, 3, 1, 4
C. 4, 5, 2, 3, 1
D. 4, 3, 5, 2, 1
Physical security measures typically include which of the following components?
A. Physical, Technical, Operational
B. Technical, Strong Password, Operational
C. Operational, Biometric, Physical
D. Strong password, Biometric, Common Access Card
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 512-50 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.