Which of the following tools is designed to identify and prevent malicious Trojans or malware from infecting computer systems or electronic devices?
A. HitmanPro
B. HOIC
C. Hulk
D. Hashcat
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
Which of the following IDS components analyzes the traffic and reports if any suspicious activity is detected?
A. Command console
B. Database of attack signatures
C. Network sensor
D. Response system
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
Cibel.org, an organization, wanted to develop a web application for marketing its products to the public. In this process, they consulted a cloud service provider and requested provision of development tools, configuration management, and deployment platforms for developing customized applications.
Identify the type of cloud service requested by Cibel.org in the above scenario.
A. Infrastructure-as-a-service {laaS)
B. Platform-as-a-service
C. ldentity-as-a-service {IDaaS)
D. Security-as-a-service (SECaaS)
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
John is working as a network administrator in an MNC company. He was instructed to connect all the remote offices with the corporate office but at the same time deny communication between the remote offices. In this process, he configured a central hub at the corporate head office, through which all branch offices can communicate.
Identify the type of VPN topology implemented by John in the above scenario.
A. Mesh topology
B. Point-to-point topology
C. Star topology
D. Hub-and-spoke topology
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
Joseph, a cloud administrator, was recruited for the management and deployment of the software containers. As part of his job, Joseph employed an automated solution that converts images into containers, deploys them to the hosts, and further monitors container workflow from a single location.
Identify the solution employed by Joseph in the above scenario.
A. Network monitors
B. Sniffers
C. Port scanners
D. Orchestrators
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 6:
George, a certified security professional, was hired by an organization to ensure that the server accurately responds to customer requests. In this process, George employed a security solution to monitor the network traffic toward the server. While monitoring the traffic, he identified attack signatures such as SYN flood and ping of death attempts on the server.
Which of the following categories of suspicious traffic signature has George identified in the above scenario?
A. Denial-of-service (DoS)
B. Informational
C. Unauthorized access
D. Reconnaissance
正解:A
質問 7:
A major fire broke out in the storeroom of CyberSol Inc. It first gutted the equipment in the storeroom and then started spreading to other areas in the company. The officials of the company informed the fire department. The fire rescue team reached the premises and used a distribution piping system to suppress the fire, thereby preventing any human or asset loss.
Identify the type of fire-fighting system used by the rescue team in the above scenario.
A. Sprinkler system
B. Fire extinguisher
C. Wet chemical suppressant
D. Standpipe system
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
Esaki -
Pass4Testのこの112-51の問題集はほかのサイトに比べて、わかりやすかったですし、内容も全面的で、一発で試験に合格いたしました。Pass4Testさんお世話になりました。