=141==
You are a systems administrator for a
company. You are accessing your file server remotely for maintenance.
你是一家公司的系統管理員。你正在遠程訪問你的文件伺服器進行維護。
Suddenly, you are unable to access the
server.
突然間,你無法訪問伺服器。
After contacting others in your department,
you find out that they cannot access the file server either.
與部門其他人聯繫後,你發現他們也無法訪問文件伺服器。
You can ping the file server but not
connect to it via RDP.
你可以 ping 文件伺服器,但無法通過 RDP 連接它。
You check the Active Directory Server, and
all is well.
你檢查了 Active Directory 伺服器,一切正常。
You check the email server and find that
emails are sent and received normally.
你檢查了電子郵件伺服器,發現電子郵件正常發送和接收。
What is the most likely issue?
最可能的問題是什麼?
A. An admin account issue 管理員帳戶問題
B. An email service issue 電子郵件服務問題
C. A denial-of-service issue 拒絕服務問題
D. The file server has shut down 文件伺服器已關閉
=142==
QuadTech Solutions is a leading security
services enterprise.
QuadTech Solutions 是一家領先的安全服務企業。
Dickson, who works as an incident responder
for this firm, is performing a vulnerability assessment to identify the
security problems in the network by using automated tools for identifying the
hosts, services, and vulnerabilities in the enterprise network.
在這家公司擔任事件響應者的 Dickson 正在進行漏洞評估,以通過使用自動化工具識別企業網絡中的主機、服務和漏洞來識別網絡中的安全問題。
In the above scenario, which of the
following types of vulnerability assessment is Dickson performing?
在上述場景中,Dickson 正在進行哪種類型的漏洞評估?
A. External assessment 外部評估
B. Passive assessment 被動評估
C. Active assessment 主動評估
D. Internal assessment 內部評估
=143==
Your organization has a large amount of
customer PII, and you want to protect those data from theft or unauthorized
availability.
你的組織擁有大量的客戶PII,你想保護這些數據不被盜竊或未經授權的使用。
Among other actions, you classify and
encrypt the data.
在其他操作中,你對數據進行分類和加密。
In this process, which of the following
OWASP security risks are you guarding against?
在這個過程中,你防範的是以下哪種OWASP安全風險?
A. Insecure deserialization 不安全的反序列化
B. Sensitive data exposure 敏感數據暴露
C. Security misconfiguration 安全配置錯誤
D. Broken authentication 身份驗證失敗
=144==
Allan performed a reconnaissance attack on
his corporate network as part of a red-team activity.
Allan 在他的公司網絡上進行了一次偵察攻擊,作為紅隊活動的一部分。
He scanned the IP range to find live host
IP addresses.
他掃描了IP範圍以查找活動的主機IP地址。
What type of technique did he use to
exploit the network?
他使用了哪種技術來利用網絡?
A. Ping sweeping Ping 掃描
B. Port scanning 端口掃描
C. Social engineering 社會工程學
D. DNS footprinting DNS足跡
=145==
What is the name of the type of malicious
software or malware designed to deny access to a computer system or data until
money is paid?
這種惡意軟件或惡意程序的名稱是什麼,這種軟件或程序旨在拒絕訪問計算機系統或數據,直到支付金錢?
A. Adware 廣告軟件
B. Spyware 間諜軟件
C. Virus 病毒
D. Ransomware 勒索軟件
=146==
Investigator Ian gives you a drive image to
investigate.
調查員 Ian 給你一個驅動器映像進行調查。
What type of analysis are you performing?
你正在進行哪種類型的分析?
A. Dynamic 動態
B. Static 靜態
C. Live 實時
D. Real-time 即時
=147==
You are talking to a colleague who is
deciding what information they should include in their organization's logs to
help with security auditing.
你正在與一位同事交談,他正在決定應在組織的日誌中包含哪些信息以幫助安全審計。
Which of the following items should you
tell them to NOT log?
你應告訴他們不要記錄以下哪項?
A. userid 用戶ID
B. Session ID 會話ID
C. Source IP address 源IP地址
D. Timestamp 時間戳
=148==
Which of the following is a common tool
used to help detect malicious internal or compromised actors?
以下哪項是用於幫助檢測惡意內部或受損行為者的常用工具?
A. SOC2 compliance report SOC2 合規報告
B. Log forwarding 日誌轉發
C. User behavior analytics 用戶行為分析
D. Syslog configuration Syslog 配置
=149==
Deleting malicious code and disabling
breached user accounts are examples of which of the following?
刪除惡意代碼和禁用被破壞的用戶帳戶是以下哪項的例子?
A. Troubleshooting 故障排除
B. Ethical hacking 道德駭客
C. Eradication 根除
D. Customer support 客戶支持
=150==
Michael is a part of the computer incident
response team of a company.
Michael 是公司計算機事件響應團隊的一員。
One of his responsibilities is to handle
email incidents.
他的其中一項責任是處理電子郵件事件。
The company receives an email from an
unknown source, and one of the steps that he needs to take is to check the
validity of the email.
公司收到來自未知來源的電子郵件,他需要採取的步驟之一是檢查電子郵件的有效性。
Which of the following tools should he use?
他應使用以下哪種工具?
A. Email Dossier 電子郵件卷宗
B. Yesware Yesware
C. G Suite Toolbox G Suite 工具箱
D. Zendio Zendio
CCBAD BBCCA
留言
張貼留言