What is the primary use of hash (one-way) encryption in networking?
A. Signing files, for data integrity
B. Encrypting files, for data confidentiality
C. Key exchange, for user authentication
D. User authentication, for non-repudiation
正解:A
質問 2:
At what layer of the OSI/RM does a packet filter operate?
A. Layer 1
B. Layer 7
C. Layer 3
D. Layer 5
正解:C
質問 3:
Which tool is best suited for identifying applications and code on a Web server that can lead to a SQL injection attack?
A. A vulnerability scanner
B. An intrusion-detection system
C. A network switch
D. A packet sniffer
正解:A
質問 4:
You purchased a network scanner six months ago. In spite of regularly conducting scans using this software, you have noticed that attackers have been able to compromise your servers over the last month. Which of the following is the most likely explanation for this problem?
A. The network scanner is no substitute for scans conducted by an individual.
B. The network scanner needs to be replaced.
C. The network scanner needs an update.
D. The network scanner has a trojan.
正解:C
質問 5:
The best way to thwart a dictionary attack is by enforcing a:
A. firewall configuration policy.
B. restricted access policy.
C. proxy server policy.
D. strong password policy.
正解:D
質問 6:
What is the primary drawback of using symmetric-key encryption?
A. Key transport across a network
B. Inability to support convergence traffic
C. Speed of encryption
D. Denial-of-service attacks
正解:A
Shiina -
御社から1D0-571の問題集を購入しましたが、
試験に95パーセント出題され、合格できました。
今後もし更新されましたら、よろしくお願いしますね。