=101==
ZYX company experienced a DoS/DDoS attack
on their network.
ZYX公司經歷了一次對其網路的DoS/DDoS攻擊。
Upon investigating the incident, they
concluded that the attack is an application-layer attack.
在調查事件時,他們得出結論,攻擊是一種應用層攻擊。
Which of the following attacks did the
attacker use?
攻擊者使用了以下哪種攻擊?
A. Slowloris attack Slowloris攻擊
B. SYN flood attack SYN洪水攻擊
C. UDP flood attack UDP洪水攻擊
D. Ping of death 死亡之Ping攻擊
=102==
Which of the following terms refers to vulnerable
account management functions, including account update, recovery of forgotten
or lost passwords, and password reset, that might weaken valid authentication
schemes?
以下哪個術語指的是易受攻擊的帳戶管理功能,包括帳戶更新、忘記或丟失密碼的恢復以及密碼重置,這可能會削弱有效的身份驗證方案?
A. Broken account management 帳戶管理破損
B. SQL injection SQL注入
C. Directory traversal 目錄遍歷
D. Cross-site scripting 跨站點腳本攻擊
=103==
Which of the following has been used to
evade IDS and IPS?
以下哪項已被用來躲避IDS和IPS?
A. Fragmentation 分段
B. TNP
C. HTTP
D. SNMP
=104==
Which of the following options describes
common characteristics of phishing emails?
以下哪個選項描述了釣魚郵件的共同特徵?
A. Urgency, threatening, or promising
subject lines 緊急、威脅或有吸引力的主題行
B. No BCC fields 沒有BCC字段
C. Written in French 用法語書寫
D. Sent from friends or colleagues 朋友或同事發送
=105==
Which of the following is the BEST method
to prevent email incidents?
以下哪種方法是防止電子郵件事件的最佳方法?
A. Disabling HTML in email content fields 禁用電子郵件內容字段中的HTML
B. End-user training 終端用戶培訓
C. Installing antivirus rule updates 安裝防病毒規則更新
D. Web proxy filtering 網絡代理過濾
=106==
BadGuy Bob hid files in the slack space,
changed the file headers, hid suspicious files in executables, and changed the
metadata for all types of files on his hacker laptop. What has he committed?
壞人Bob將文件隱藏在鬆散的空間中,更改了文件標題,將可疑文件隱藏在可執行文件中,並更改了其駭客筆記本電腦上所有文件的元數據。他犯了什麼罪?
A. Adversarial mechanics 對抗性機制
B. Felony 重罪
C. Anti-forensics 反取證
D. Legal hostility 法律敵意
=107==
Unusual logins, accessing sensitive
information not used for the job role, and the use of personal external storage
drives on company assets are all signs of which of the following?
不尋常的登錄,訪問不用于工作角色的敏感信息,以及在公司資產上使用個人外部存儲驅動器,都是以下哪一項的跡象?
A. Lack of job rotation 缺乏工作輪換
B. Over-working 過度工作
C. Insider threat 內部威脅
D. Security breach 安全漏洞
=108==
Otis is an incident handler working in an
organization called Delmont.
Otis是Delmont公司的一名事件處理人員。
Recently, the organization faced several
setbacks in business, whereby its revenues are decreasing.
最近,該公司在業務中遭遇了多次挫折,導致收入下降。
Otis was asked to take charge and look into
the matter.
Otis被要求接管並調查此事。
While auditing the enterprise security, he
found traces of an attack through which proprietary information was stolen from
the enterprise network and passed onto their competitors.
在審計企業安全性時,他發現了攻擊者的痕跡,敏感專有信息被從企業網絡中竊取並傳遞給競爭對手。
Which of the following information security
incidents did Delmont face?
Delmont面臨以下哪種信息安全事件?
A. Email-based abuse 基於電子郵件的濫用
B. Espionage 間諜活動
C. Network and resource abuses 網絡和資源濫用
D. Unauthorized access 未經授權的訪問
=109==
Which of the following is a written or
textual record of an event that usually includes a timestamp, responsible
party, and action?
以下哪一項是事件的書面或文本記錄,通常包括時間戳、責任方和行動?
A. Packet capture 數據包捕獲
B. Log 日誌
C. Boolean expression 布爾表達式
D. Network hunt 網絡狩獵
=110==
Which of the following describes the
introduction of malicious programs onto a device connected to a campus network
(Trojan horse, email bombs, virus, etc.)?
以下哪一項描述了將惡意程序引入連接到校園網絡的設備中的過程(木馬、電子郵件炸彈、病毒等)?
A. Inappropriate usage 不當使用
B. Network access 網絡訪問
C. Unauthorized access 未經授權的訪問
D. Authorized access 授權訪問
AAAAB CCBBB
留言
張貼留言