Which one of the following is not an online attack?
A. Password spraying attack
B. Phishing attack
C. Brute force attack
D. Rainbow table attack
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
In the context of the SSH (Secure Shell) public-private key authentication mechanism, which key is uploaded to the server and which key is used by the end-user for authentication?
A. The private key is uploaded to the server and the public key is used by the end user for authentication.
B. The public key is uploaded to the server and the private key is used by the end user for authentication.
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
How many usable TCP/UDP ports are there?
A. 65535
B. 65536
C. 65335
D. 63535
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
What is the response from a closed TCP port which is behind a firewall?
A. RST and an ACK packet
B. No response
C. A SYN and an ACK packet
D. A FIN and an ACK packet
正解:B
質問 5:
Which of the following statements regarding Authorization and Authentication is true?
A. Authentication includes the execution rules that determine what functionality and data the user can access. Authentication and Authorization are both the same thing.
B. Authentication is the process where requests to access a particular resource are granted or denied. Authorization is providing and validating identity.
C. Authorization is the process where requests to access a particular resource are granted or denied. Authentication is providing and validating the identity.
D. Authentication controls which processes a person can use and which files they can access, read, or modify. Authentication and authorization typically do not operate together, thus making it impossible to determine who is accessing the information.
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 6:
A system encrypts data prior to transmitting it over a network, and the system on the other end of the transmission media decrypts it. If the systems are using a symmetric encryption algorithm for encryption and decryption, which of the following statements is true?
A. A symmetric encryption algorithm does not use keys to encrypt and decrypt data at both ends of the transmission media.
B. A symmetric encryption algorithm uses different keys to encrypt and decrypt data at both ends of the transmission media.
C. A symmetric encryption algorithm is an insecure method used to encrypt data transmitted over transmission media.
D. A symmetric encryption algorithm uses the same key to encrypt and decrypt data at both ends of the transmission media.
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
片瀬** -
CNSP試験参考資料だけ勉強しましたが、嬉しいことに、CNSP試験に合格しました。とても使い安い資料です!