You want to create a quick solution that allows you to obtain real-time login information for the administrative account on an LDAP server that you feel may become a target.
Which of the following will accomplish this goal?
A. Reinstall the LDAP service on the server so that it is updated and more secure.
B. Create a login script for the administrative account that records logins to a separate server.
C. Create a dummy administrator account on the system so that a potential hacker is distracted from the real login account.
D. Install an application that creates checksums of the contents on the hard disk.
正解:B
質問 2:
Which of the following is the device used to authenticate and encrypt packets in IPsec?
A. Internet Key Exchange (IKE)
B. Encryption tunnel
C. Encapsulating Security Payload (ESP)
D. Authentication Header (AH)
正解:C
質問 3:
An effective way to prevent a user from becoming the victim of a malicious bot is to use a technique in which the user must view a distorted text image, and then type it before he or she is allowed to proceed with a transaction.
This technique is known as a:
A. CAPTCHA.
B. SQL injection.
C. botnet.
D. zombie.
正解:A
質問 4:
What is the first tool needed to create a secure networking environment?
A. User authentication
B. Auditing
C. Confidentiality
D. Security policy
正解:D
質問 5:
You have implemented a service on a Linux system that allows a user to read and edit resources.
What is the function of this service?
A. Data integrity
B. Authentication
C. Access control
D. Intrusion detection
正解:C
質問 6:
Jason is attempting to gain unauthorized access to a corporate server by running a program that enters passwords from a long list of possible passwords.
Which type of attack is this?
A. Botnet
B. Buffer overflow
C. Denial of service
D. Brute force
正解:D
質問 7:
Why should you notify the hacker's ISP if you have successfully identified a hacker?
A. You can have the ISP retaliate by altering the hacker's login script.
B. You can have the ISP retaliate by placing a trojan or virus on the hacker's system.
C. You can have the ISP reconfigure the hacker's routing tables.
D. You can have the ISP terminate the connection so the attack can be stopped.
正解:D
Enomoto -
1D0-671の問題集だけでで必要十分な知識を得ることができる。本当に受かった。サンキューPass4Test