AllExam Dumps

DUMPS, FREE DUMPS, VCP5 DUMPS| VMWARE DUMPS, VCP DUMPS, VCP4 DUMPS, VCAP DUMPS, VCDX DUMPS, CISCO DUMPS, CCNA, CCNA DUMPS, CCNP DUMPS, CCIE DUMPS, ITIL, EXIN DUMPS,


READ Free Dumps For ECCouncil- 312-50





Question ID 6870

Which of the following lists are valid data-gathering activities associated with a risk assessment?

Option A

Threat identification, vulnerability identification, control analysis

Option B

Threat identification, response identification, mitigation identification

Option C

Attack profile, defense profile, loss profile

Option D

System profile, vulnerability identification, security determination

Correct Answer a
Explanation


Question ID 6871

A penetration tester is hired to do a risk assessment of a company's DMZ. The rules of
engagement states that the penetration test be done from an external IP address with no prior
knowledge of the internal IT systems. What kind of test is being performed?

Option A

white box

Option B

grey box

Option C

r e d
b o x

Option D

black box

Correct Answer d
Explanation

Send email to admin@getfreedumps for new dumps request!!!