=041==
Which of the following types of insider
threats involves an insider who is uneducated on potential security threats or
simply bypasses general security procedures to meet workplace efficiency?
下列哪一種類型的內部威脅涉及對潛在安全威脅不夠了解或僅僅為了滿足工作場所效率而繞過一般安全程序的內部人員?
Ⓐ Professional insider 專業內部人員
Ⓑ Malicious insider 惡意內部人員
Ⓒ Compromised insider 被妥協的內部人員
Ⓓ Negligent insider 疏忽的內部人員
=042==
Adam is an incident handler who intends to
use DBCC LOG command to analyze a database and retrieve the active transaction
log files for the specified database.
Adam 是一名事件處理員,他打算使用 DBCC LOG 命令來分析數據庫並檢索指定數據庫的活動事務日誌文件。
The syntax of DBCC LOG command is DBCC
LOG(<databasename>, <type>, <output>), where the output
parameter specifies the level of information an incident handler wants to retrieve.
DBCC LOG 命令的語法是 DBCC LOG(<數據庫名稱>, <類型>, <輸出>),其中輸出參數指定事件處理員希望檢索的信息級別。
If Adam wants to retrieve the full
information on each operation along with the hex dump of a current transaction
row, which of the following output parameters should Adam use?
如果 Adam 想檢索每個操作的全部信息以及當前交易行的十六進制轉儲,他應該使用下列哪個輸出參數?
Ⓐ 0
Ⓑ 1
Ⓒ 3
Ⓓ 4
=043==
Eric works as an incident handler at Eirnol
software systems.
Eric 在 Eirnol 軟體系統公司擔任事件處理員。
He was assigned a task to protect the
organization from any kind of DoS/DDoS attacks.
他被指派了一項任務來保護公司免受任何形式的 DoS/DDoS 攻擊。
Which of the following tools can be used by
Eric to accomplish this task?
以下哪一種工具可以用來幫助 Eric 完成這項任務?
Ⓐ Tcptrace
Ⓑ Hydra
Ⓒ Wireshark
Ⓓ IDA
=044==
Which of the following encoding techniques
replaces unusual ASCII characters with '%' followed by the character's
two-digit ASCII code expressed in hexadecimal?
下列哪一種編碼技術將不常見的 ASCII 字符替換為 '%',後跟以十六進制表示的字符的兩位
ASCII 代碼?
Ⓐ Unicode encoding
Ⓑ URL encoding
Ⓒ HTML encoding
Ⓓ Base64 encoding
=045==
Chandler is a professional hacker who is
targeting an organization called Technote.
Chandler 是一名專業駭客,他的目標是名為 Technote 的公司。
He wants to obtain the important
organizational information that is being transmitted between different
hierarchies.
他想獲取在不同層級之間傳輸的重要組織信息。
He proceeds in sniffing the data packets
transmitted through the network and then analyzing them to gather packet
details such as network, ports, protocols, devices, issues in network
transmission, and other network-related information.
他開始攔截通過網絡傳輸的數據包,然後分析它們以收集數據包的詳細信息,例如網絡、端口、協議、設備、網絡傳輸中的問題以及其他與網絡相關的信息。
Which of the following tools would Chandler
employ to perform packet analysis?
Chandler 會使用以下哪種工具來執行數據包分析?
Ⓐ IDAPro
Ⓑ Omnipeek
Ⓒ Ettercap
Ⓓ Sharp
=046==
Eric is an incident responder and is
working on developing incident-handling plans and procedures.
Eric 是一名事件響應人員,正在制定事件處理計劃和程序。
As part of this process, he is performing
an analysis on the organizational network to generate a report and develop
policies based on the acquired results.
作為這一過程的一部分,他正在對組織網絡進行分析,以生成報告並根據獲得的結果制定政策。
Which of the following tools will help him
in analyzing his network and the related traffic?
以下哪一種工具將幫助他分析他的網絡和相關流量?
Ⓐ FaceNiff
Ⓑ Burp Suite
Ⓒ Wireshark
Ⓓ Whois
=047==
Zaimasoft, a prominent IT organization, was
attacked by perpetrators who directly targeted the hardware and caused
irreversible damage to the hardware.
Zaimasoft,一家知名 IT 公司,遭到了直接針對硬件的攻擊者的攻擊,並對硬件造成了不可逆的損害。
In result, replacing or reinstalling the
hardware was the only solution.
結果,更換或重新安裝硬件是唯一的解決方案。
Identify the type of denial-of-service
attack performed on Zaimasoft.
識別對 Zaimasoft 執行的拒絕服務攻擊類型。
Ⓐ DDoS
Ⓑ PRDoS
Ⓒ PDoS
Ⓓ DoS
=048==
A US Federal Agency network was the target
of a DoS attack that prevented and impaired the normal authorized functionality
of the networks.
一家美國聯邦機構的網絡成為 DoS 攻擊的目標,這種攻擊阻止並削弱了網絡的正常授權功能。
According to the agency's reporting
timeframe guidelines, this incident should be reported within 2 h of
discovery/identification if the successful attack is still ongoing and the
agency needs to successfully mitigate the activity.
根據該機構的報告時間框架指南,如果成功的攻擊仍在進行中,並且該機構需要成功減輕該活動,則應在發現/識別後的 2 小時內報告此事件。
In which incident category of US Federal
Agencies does this incident belong to?
該事件屬於美國聯邦機構的哪一類事件?
Ⓐ CAT 6
Ⓑ CAT 5
Ⓒ CAT 3
Ⓓ CAT 1
=049==
Which of the following information security
personnel handles incidents from management and technical point of view?
以下哪一位信息安全人員從管理和技術的角度處理事件?
Ⓐ Network administrators 網絡管理員
Ⓑ Incident manager (IM) 事件管理員 (IM)
Ⓒ Forensic investigators 鑑證調查員
Ⓓ Threat researchers 威脅研究員
=050==
During the vulnerability assessment phase,
the incident responders perform various steps as below:
在漏洞評估階段,事件響應人員執行以下各種步驟:
1.Run vulnerability scans using tools使用工具運行漏洞掃描
2.Identify and prioritize vulnerabilities識別和優先處理漏洞
3.Examine available physical security檢查現有的物理安全
4.Perform OSINT information gathering to
validate the vulnerabilities執行 OSINT 信息收集以驗證漏洞
5.Apply business and technology context to
scanner results將業務和技術背景應用於掃描器結果
6.Document misconfigurations and human
errors記錄錯誤配置和人為錯誤
7.Create a vulnerability scan report創建漏洞掃描報告
Identify the correct sequence of
vulnerability assessment steps performed by the incident responders.識別事件響應人員執行的漏洞評估步驟的正確順序。
Ⓐ 1→2→4→3→5→7→6
Ⓑ 2→1→5→4→3→7→6
Ⓒ 3→1→4→2→5→6→7
Ⓓ 1→3→2→4→5→6→7
DDABB CCCBB
留言
張貼留言