跳到主要內容

ECIH_A_101-110

 =101==

ZYX company experienced a DoS/DDoS attack on their network.

ZYX公司經歷了一次對其網路的DoS/DDoS攻擊。

Upon investigating the incident, they concluded that the attack is an application-layer attack.

在調查事件時,他們得出結論,攻擊是一種應用層攻擊。

Which of the following attacks did the attacker use?

攻擊者使用了以下哪種攻擊?

A. Slowloris attack Slowloris攻擊

B. SYN flood attack SYN洪水攻擊

C. UDP flood attack UDP洪水攻擊

D. Ping of death 死亡之Ping攻擊

 

=102==

Which of the following terms refers to vulnerable account management functions, including account update, recovery of forgotten or lost passwords, and password reset, that might weaken valid authentication schemes?

以下哪個術語指的是易受攻擊的帳戶管理功能,包括帳戶更新、忘記或丟失密碼的恢復以及密碼重置,這可能會削弱有效的身份驗證方案?

A. Broken account management 帳戶管理破損

B. SQL injection SQL注入

C. Directory traversal 目錄遍歷

D. Cross-site scripting 跨站點腳本攻擊

 

=103==

Which of the following has been used to evade IDS and IPS?

以下哪項已被用來躲避IDSIPS

A. Fragmentation 分段

B. TNP

C. HTTP

D. SNMP

 

=104==

Which of the following options describes common characteristics of phishing emails?

以下哪個選項描述了釣魚郵件的共同特徵?

A. Urgency, threatening, or promising subject lines 緊急、威脅或有吸引力的主題行

B. No BCC fields 沒有BCC字段

C. Written in French 用法語書寫

D. Sent from friends or colleagues 朋友或同事發送

 

=105==

Which of the following is the BEST method to prevent email incidents?

以下哪種方法是防止電子郵件事件的最佳方法?

A. Disabling HTML in email content fields 禁用電子郵件內容字段中的HTML

B. End-user training 終端用戶培訓

C. Installing antivirus rule updates 安裝防病毒規則更新

D. Web proxy filtering 網絡代理過濾

 

=106==

BadGuy Bob hid files in the slack space, changed the file headers, hid suspicious files in executables, and changed the metadata for all types of files on his hacker laptop. What has he committed?

壞人Bob將文件隱藏在鬆散的空間中,更改了文件標題,將可疑文件隱藏在可執行文件中,並更改了其駭客筆記本電腦上所有文件的元數據。他犯了什麼罪?

A. Adversarial mechanics 對抗性機制

B. Felony 重罪

C. Anti-forensics 反取證

D. Legal hostility 法律敵意

 

=107==

Unusual logins, accessing sensitive information not used for the job role, and the use of personal external storage drives on company assets are all signs of which of the following?

不尋常的登錄,訪問不用于工作角色的敏感信息,以及在公司資產上使用個人外部存儲驅動器,都是以下哪一項的跡象?

A. Lack of job rotation 缺乏工作輪換

B. Over-working 過度工作

C. Insider threat 內部威脅

D. Security breach 安全漏洞

 

=108==

Otis is an incident handler working in an organization called Delmont.

OtisDelmont公司的一名事件處理人員。

Recently, the organization faced several setbacks in business, whereby its revenues are decreasing.

最近,該公司在業務中遭遇了多次挫折,導致收入下降。

Otis was asked to take charge and look into the matter.

Otis被要求接管並調查此事。

While auditing the enterprise security, he found traces of an attack through which proprietary information was stolen from the enterprise network and passed onto their competitors.

在審計企業安全性時,他發現了攻擊者的痕跡,敏感專有信息被從企業網絡中竊取並傳遞給競爭對手。

Which of the following information security incidents did Delmont face?

Delmont面臨以下哪種信息安全事件?

A. Email-based abuse 基於電子郵件的濫用

B. Espionage 間諜活動

C. Network and resource abuses 網絡和資源濫用

D. Unauthorized access 未經授權的訪問

 

=109==

Which of the following is a written or textual record of an event that usually includes a timestamp, responsible party, and action?

以下哪一項是事件的書面或文本記錄,通常包括時間戳、責任方和行動?

A. Packet capture 數據包捕獲

B. Log 日誌

C. Boolean expression 布爾表達式

D. Network hunt 網絡狩獵

 

=110==

Which of the following describes the introduction of malicious programs onto a device connected to a campus network (Trojan horse, email bombs, virus, etc.)?

以下哪一項描述了將惡意程序引入連接到校園網絡的設備中的過程(木馬、電子郵件炸彈、病毒等)?

A. Inappropriate usage 不當使用

B. Network access 網絡訪問

C. Unauthorized access 未經授權的訪問

D. Authorized access 授權訪問

AAAAB CCBBB

留言

這個網誌中的熱門文章

ECIH_A_051-060

  =051== In which of the following phases of incident handling and response (IH&R) process are the identified security incidents analyzed, validated, categorized, and prioritized? 在事件處理和響應 (IH&R) 流程的哪個階段,已識別的安全事件會被分析、驗證、分類和優先排序? A. Incident triage, 事件分類 B. Notification, 通知 C. Incident recording and assignment, 事件記錄和分配 D. Containment, 控制   =052== Browser data can be used to access various credentials. 瀏覽器數據可以用來訪問各種憑證。 Which of the following tools is used to analyze the history data files in Microsoft Edge browser? 以下哪個工具用於分析 Microsoft Edge 瀏覽器中的歷史數據文件? A. MZHistoryView B. BrowsingHistoryView C. ChromeHistoryView D. MZCacheView   =053== Eve is an incident handler in ABC organization. Eve 是 ABC 組織的事件處理人員。 One day, she got a complaint about an email hacking incident from one of the employees of the organization. 有一天,她收到該組織的一名員工關於電子郵件駭客事件的投訴。 As an incident handler, Eve follows a set of recovery steps in order to recover...

ECIH_B_001-010

  =001== XYZ Corp. recently shifted its infrastructure to Microsoft Azure and soon after faced an unexpected data breach. XYZ 公司最近將其基礎設施轉移到 Microsoft Azure ,但不久後就遭遇了意外的數據洩漏事件。 The event led to confidential data being accessed by an unauthorized user. 該事件導致機密數據被未經授權的用戶訪問。 As the newly appointed EC-Council Certified Incident Handler, you are tasked with improving the incident response strategy to prevent such security incidents in the future. 作為新任命的 EC-Council 認證事件處理人員,您被要求改進事件響應策略,以防止未來發生此類安全事件。 What is the best course of action? 最佳行動方案是什麼? · Activate Azure disk encryption for all data stored in the cloud. 啟用 Azure 磁碟加密,對雲端中儲存的所有數據進行加密。 · Transition all operations to Azure private network to enhance control over data. 將所有操作轉移到 Azure 私人網路,以增強對數據的控制。 · Implement Azure network security groups to limit access to resources. 實施 Azure 網路安全群組,限制對資源的訪問。 · Set up Azure Security Center and enable just-in-time VM access. 設置 Azure 安全中心並啟用即時虛擬機存取。 =002== The CEO of a l...

ECIH_B_031-040

=031== An employee accidentally emails confidential customer information to a personal email address. 一名員工不小心將機密客戶資訊發送到個人電子郵件地址。 What is the biggest challenge faced by the incident response team in this scenario? 在此情境中,事件回應團隊面臨的最大挑戰是什麼? Ⓐ Determining the intent of the employee 確定員工的意圖 Ⓑ Balancing the need for confidentiality and transparency with stakeholders 平衡保密需求與對利害關係人保持透明之間的需求 Ⓒ Identifying the extent of the damage caused by the incident 確定事件造成的損害程度 Ⓓ Identifying the source of the email server used to send the email 確定用於發送郵件的電子郵件伺服器的來源 =032== An incident handling team has been alerted about a possible security breach on a Linux system. 一個事件處理團隊收到有關 Linux 系統可能發生安全漏洞的警報。 As an EC-Council Certified Incident Handler, you decide to perform an incident triage using a tool named buck-security on Linux. 作為 EC-Council 認證的事件處理人員,您決定使用名為 buck-security 的工具在 Linux 上進行事件分類。 After conducting the security check, buck-security returns a warning message indicating a ...