Exam Details

  • Exam Code
    :312-50V8
  • Exam Name
    :Certified Ethical Hacker v8
  • Certification
    :New Release
  • Vendor
    :NetApp
  • Total Questions
    :1008 Q&As
  • Last Updated
    :May 13, 2024

NetApp New Release 312-50V8 Questions & Answers

  • Question 11:

    Access control is often implemented through the use of MAC address filtering on wireless Access Points.

    Why is this considered to be a very limited security measure?

    A. Vendors MAC address assignment is published on the Internet.

    B. The MAC address is not a real random number.

    C. The MAC address is broadcasted and can be captured by a sniffer.

    D. The MAC address is used properly only on Macintosh computers.

  • Question 12:

    In order to attack a wireless network, you put up an access point and override the signal of the real access point. As users send authentication data, you are able to capture it.

    What kind of attack is this?

    A. Rouge access point attack

    B. Unauthorized access point attack

    C. War Chalking

    D. WEP attack

  • Question 13:

    802.11b is considered a ____________ protocol.

    A. Connectionless

    B. Secure

    C. Unsecure

    D. Token ring based

    E. Unreliable

  • Question 14:

    In an attempt to secure his 802.11b wireless network, Ulf decides to use a strategic antenna positioning. He places the antenna for the access points near the center of the building. For those access points near the outer edge of the building he uses semi-directional antennas that face towards the building's center. There is a large parking lot and outlying filed surrounding the building that extends out half a mile around the building. Ulf figures that with this and his placement of antennas, his wireless network will be safe from attack.

    Which of the following statements is true?

    A. With the 300 feet limit of a wireless signal,Ulf's network is safe.

    B. Wireless signals can be detected from miles away,Ulf's network is not safe.

    C. Ulf's network will be safe but only of he doesn't switch to 802.11a.

    D. Ulf's network will not be safe until he also enables WEP.

  • Question 15:

    Which of the following is NOT a reason 802.11 WEP encryption is vulnerable?

    A. There is no mutual authentication between wireless clients and access points

    B. Automated tools like AirSnort are available to discover WEP keys

    C. The standard does not provide for centralized key management

    D. The 24 bit Initialization Vector (IV) field is too small

  • Question 16:

    Which of the following is true of the wireless Service Set ID (SSID)? (Select all that apply.)

    A. Identifies the wireless network

    B. Acts as a password for network access

    C. Should be left at the factory default setting

    D. Not broadcasting the SSID defeats NetStumbler and other wireless discovery tools

  • Question 17:

    Which of the following wireless technologies can be detected by NetStumbler? (Select all that apply)

    A. 802.11b

    B. 802.11e

    C. 802.11a

    D. 802.11g

    E. 802.11

  • Question 18:

    In an attempt to secure his wireless network, Bob turns off broadcasting of the SSID. He concludes that since his access points require the client computer to have the proper SSID, it would prevent others from connecting to the wireless network. Unfortunately unauthorized users are still able to connect to the wireless network.

    Why do you think this is possible?

    A. Bob forgot to turn off DHCP.

    B. All access points are shipped with a default SSID.

    C. The SSID is still sent inside both client and AP packets.

    D. Bob's solution only works in ad-hoc mode.

  • Question 19:

    In an attempt to secure his wireless network, Bob implements a VPN to cover the wireless communications. Immediately after the implementation, users begin complaining about how slow the wireless network is. After benchmarking the network's speed. Bob discovers that throughput has dropped by almost half even though the number of users has remained the same.

    Why does this happen in the VPN over wireless implementation?

    A. The stronger encryption used by the VPN slows down the network.

    B. Using a VPN with wireless doubles the overhead on an access point for all direct client to access point communications.

    C. VPNs use larger packets then wireless networks normally do.

    D. Using a VPN on wireless automatically enables WEP,which causes additional overhead.

  • Question 20:

    WEP is used on 802.11 networks, what was it designed for?

    A. WEP is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what it usually expected of a wired LAN.

    B. WEP is designed to provide strong encryption to a wireless local area network (WLAN) with a lever of integrity and privacy adequate for sensible but unclassified information.

    C. WEP is designed to provide a wireless local area network (WLAN) with a level of availability and privacy comparable to what is usually expected of a wired LAN.

    D. WEOP is designed to provide a wireless local area network (WLAN) with a level of privacy comparable to what it usually expected of a wired LAN.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only NetApp exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V8 exam preparations and NetApp certification application, do not hesitate to visit our Vcedump.com to find your solutions here.