=131==
Jason is setting up a computer forensics
lab and must perform the following steps:
Jason 正在設立一個電腦鑑識實驗室,並且必須執行以下步驟:
1.physical location and structural design
considerations;物理位置和結構設計考量;
2.planning and budgeting;規劃和預算;
3.work area considerations;工作區域考量;
4.physical security recommendations;物理安全建議;
5.forensic lab licensing;鑑識實驗室許可證;
6.human resource considerations.人力資源考量。
Arrange these steps in the order of
execution.
請按執行順序排列這些步驟。
A. 2 -> 1 -> 3 -> 6 -> 4 ->
5
B. 5 -> 2 -> 1 -> 3 -> 4 ->
6
C. 2 -> 3 -> 1 -> 4 -> 6 ->
5
D. 2 -> 3 -> 1 -> 4 -> 6 ->
5
=132==
Network Ned is the security administrator
for a company.
Network Ned 是一家公司的安全管理員。
He is going to place the company's new web
server into production.
他打算將公司的新網頁伺服器投入生產。
Into which of the following zones should he
place the server to best protect the company's network?
他應該將伺服器放置在哪個區域以最佳保護公司的網路?
A. Honeypot 蜜罐
B. Intranet 內聯網
C. DMZ 非軍事區
D. Sandbox 沙盒
=133==
Raven is a part of an I&H&R team
and was informed by her manager to handle and lead the removal of the root
cause for an incident and to do all attack vectors for potential similar
incidents in the future.
Raven 是 I&H&R 團隊的一員,她的經理通知她處理並主導移除事件的根本原因,並處理所有潛在的攻擊向量以應對未來可能發生的類似事件。
Raven notifies the information security
officers and developers of affected resources.
Raven 通知受影響資源的信息安全官和開發人員。
Which of the following steps of the
incident response process does Raven need to implement to remove the root cause
of the incident?
Raven 需要實施以下哪個事件響應過程步驟來消除事件的根本原因?
A. Containment 控制
B. Eradication 根除
C. Incident triage 事件分類
D. Evidence gathering and forensic analysis
蒐證和鑑識分析
=134==
Ross is an incident manager (IM) at an
organization, and his team provides support to all users in the organization
who are affected by threats or attacks.
Ross 是一家組織的事件經理 (IM),他的團隊為組織中受威脅或攻擊影響的所有用戶提供支持。
David, who is the organization's internal
auditor, is also part of Ross's incident response team.
David 是組織的內部審計員,也是 Ross 事件響應團隊的一員。
Which of the following is David's
responsibility?
以下哪項是 David 的責任?
A. Coordinate incident containment
activities with the information security officer (ISO). 與信息安全官 (ISO) 協調事件控制活動
B. Identify and report security loopholes
to the management for necessary action. 識別並向管理層報告安全漏洞以採取必要行動
C. Configure information security controls.
配置信息安全控制
D. Perform the necessary action to block
the network traffic from the suspected intruder. 執行必要操作以阻止來自可疑入侵者的網絡流量
=135==
Which of the following is an attack that
occurs when a malicious program causes a user's browser to perform an unwanted
action on a trusted site for which the user is currently authenticated?
以下哪項是當惡意程序導致用戶的瀏覽器在受信任網站上執行未經授權的操作時發生的攻擊?
A. Insecure direct object references 不安全的直接對象引用
B. SQL injection SQL 注入
C. Cross-site request forgery 跨站點請求偽造
D. Cross-site scripting 跨站點腳本攻擊
=136==
Which of the following is an inappropriate
usage incident?
以下哪項是濫用事件?
A. Access-control attack 訪問控制攻擊
B. Denial-of-service attack 拒絕服務攻擊
C. Insider threat 內部威脅
D. Reconnaissance attack 偵察攻擊
=137==
Francis received a spoof email asking for
his bank information.
Francis 收到一封請求他銀行信息的欺詐電子郵件。
He decided to use a tool to analyze the
email headers.
他決定使用一個工具來分析電子郵件標頭。
Which of the following should he use?
他應該使用以下哪個工具?
A. EventLog Analyzer 事件日誌分析器
B. PoliteMail PoliteMail
C. MxToolbox MxToolbox
D. Email Checker 電子郵件檢查器
=138==
Which of the following techniques against
insider threats identifies events that are related to suspicious activity?
以下哪種技術可以識別與可疑活動相關的事件以對抗內部威脅?
A. Pattern discovery 模式發現
B. Anomaly detection 異常檢測
C. Correlation 相關性
D. Normalization 正規化
=139==
Alexa downloaded a movie file.
Alexa 下載了一個電影文件。
However, upon execution, it unleashed a
dangerous program that sent Alexa's credit-card information to an attacker.
然而,在執行時,它釋放了一個將 Alexa 的信用卡信息發送給攻擊者的危險程序。
What is this malicious program masked as a
movie file?
這個偽裝成電影文件的惡意程序是什麼?
A. Backdoor 後門程序
B. Trojan horse 特洛伊木馬
C. Ransomware 勒索軟體
D. Rootkit Rootkit
=140==
Which of the following risk management
processes identifies the risks, estimates the impact, and determines sources to
recommend proper mitigation measures?
以下哪個風險管理過程識別風險,估算影響並確定資源以建議適當的緩解措施?
A. Risk mitigation 風險緩解
B. Risk assumption 風險承擔
C. Risk avoidance 風險迴避
D. Risk assessment 風險評估
ABBBCCCBBD
留言
張貼留言