A certain script was recently altered by the author to meet certain security requirements, and needs to be executed on several critical servers. Which of the following describes the process of ensuring that the script being used was not altered by anyone other than the author?
A. Code signing
B. Digital signing
C. Digital encryption
D. Password entropy
正解:A
質問 2:
Which of the following is true about an unauthenticated SAMLv2 transaction?
A. The browser asks the SP for a resource. The SP provides the browser with an XHTML format. The browser asks the IdP to validate the user, and then provides the XHTML back to the SP for access.
B. The browser asks the IdP for a resource. The IdP provides the browser with an XHTML format. The browser asks the SP to validate the user, and then provides the XHTML to the IdP for access.
C. The browser asks the IdP to validate the user. The IdP sends an XHTML form to the SP and a cookie to the browser. The browser asks for a resource to the SP, which verifies the cookie and XHTML format for access.
D. The browser asks the SP to validate the user. The SP sends an XHTML form to the IdP. The IdP provides the XHTML form back to the SP, and then the browser asks the SP for a resource.
正解:A
質問 3:
A production server has been compromised. Which of the following is the BEST way to preserve the non-volatile evidence?
A. Login remotely and perform a full backup of the server.
B. Shut the server down and image the hard drive.
C. Remove all power sources from the server.
D. Install remote backup software and copy data to write-once media.
正解:B
質問 4:
Company ABC has recently completed the connection of its network to a national high
speed private research network. Local businesses in the area are seeking sponsorship from Company ABC to connect to the high speed research network by directly connecting through Company ABC's network. Company ABC's Chief Information Officer (CIO) believes that this is an opportunity to increase revenues and visibility for the company, as well as promote research and development in the area.
Which of the following must Company ABC require of its sponsored partners in order to document the technical security requirements of the connection?
A. BPA
B. ISA
C. SLA
D. NDA
正解:B
質問 5:
A Chief Information Security Officer (CISO) has been trying to eliminate some IT security risks for several months. These risks are not high profile but still exist. Furthermore, many of these risks have been mitigated with innovative solutions. However, at this point in time, the budget is insufficient to deal with the risks. Which of the following risk strategies should be used?
A. Avoid the risks
B. Accept the risks
C. Transfer the risks
D. Mitigate the risks
正解:B
質問 6:
A growing corporation is responding to the needs of its employees to access corporate email and other resources while traveling. The company is implementing remote access for company laptops. Which of the following security systems should be implemented for remote access? (Select TWO).
A. Full disk encryption
B. Network monitoring
C. Virtual Private Network
D. Secure Sockets Layer for web servers
E. Intrusion detection systems
F. Multifactor authentication for users
正解:C,F
質問 7:
An organization determined that each of its remote sales representatives must use a smartphone for email access.
The organization provides the same centrally manageable model to each person.
Which of the following mechanisms BEST protects the confidentiality of the resident data?
A. Require a PIN and automatic wiping of the smartphone if someone enters a specific number of incorrect PINs.
B. Require encrypted communications when connecting to the organization's email server.
C. Require dual factor authentication when connecting to the organization's email server.
D. Require each sales representative to establish a PIN to access the smartphone and limit email storage to two weeks.
正解:A
松*渓 -
解説があるので時間短縮できて使いやすいです。とくにPass4Testさんが開発したアプリバージョンは大のお気に入りです。