Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

McAfee MA0-150 Exam -

Free MA0-150 Sample Questions:

Q: 1
An attacker has compromised a Linux/Unix host and discovers a suspicious file called "password" that has no file extension. What command can be used to determine the filetype?
A. filetype
B. file
C. filer
D. fileext
Answer: B

Q: 2
What Microsoft utility encrypts the hashed passwords in a SAM database using 128-bit encryption?
C. Syskey
D. Kerberos
Answer: C

Q: 3
What is the correct syntax to query under which service a user account is running?
A. sc.exe \\ qc <service>
B. sc.exe \\ <service>
C. net start \\ qc
D. net start W192.168.1.1
Answer: A

Q: 4
What file indicates and controls where system logs are stored?
A. pam.conf
B. smb.conf
C. authlog.conf
D. syslog.conf
Answer: D

Q: 5
The command "grep password *" searches for
A. The word "password" in all files in the current directory.
B. The character "*" in the file "password".
C. The word "password" in all files in the current directory and all subdirectories.
D. All passwords in the file named "*".
Answer: A

Q: 6
An attacker has just compromised a Linux host. What command can be used to determine the distribution of Linux?
A. cat /etc/crontab
B. cat /etc/passwd
C. cat/etc/issue
D. cat /etc/shadow
Answer: C

Q: 7
In computer security, a small piece of code that acts as a payload in which an attacker can control a remote machine is called
A. A buffer overflow.
B. A NOP sled.
C. Shell code.
D. Stack overflow.
Answer: C

Q: 8
A person connects to a web application via a mobile device. What request header name can this application use determine which device the person is using?
A. Referer
B. User agent
C. Connection
D. Host
Answer: B

Q: 9
What is the proper syntax for enumerating non-hidden shares on a host?
A. net view /domain
B. net view /domain:{domain}
C. net view \\{target}
D. net use \\{target}\ipc$ "" /u:""
Answer: C

Q: 10
What is the term used for a technique that runs code within the address space of another process by forcing it to bad a library?
A. Address space layout randomization
B. Overwriting HP
C. DLL injection
D. SQL injection
Answer: C

© 2014, All Rights Reserved