00:00

QUESTION 26

Peter extracts the SIDs list from Windows 2000 Server machine using the hacking tool "SIDExtractor". Here is the output of the SIDs:
312-50v11 dumps exhibit
From the above list identify the user account with System Administrator privileges.

Correct Answer: F

QUESTION 27

Due to a slowdown of normal network operations, the IT department decided to monitor internet traffic for all of the employees. From a legal standpoint, what would be troublesome to take this kind of measure?

Correct Answer: C

QUESTION 28

Peter is surfing the internet looking for information about DX Company. Which hacking process is Peter doing?

Correct Answer: B

QUESTION 29

Which Intrusion Detection System is the best applicable for large environments where critical assets on the network need extra scrutiny and is ideal for observing sensitive network segments?

Correct Answer: C

QUESTION 30

What type of analysis is performed when an attacker has partial knowledge of inner-workings of the application?

Correct Answer: D