Stella purchased a smartwatch online using her debit card. After making payment for the product through the payment gateway, she received a transaction text message with a deducted and available balance from her bank.
Identify the information security element that ensures that Stella's transaction status is immediately reflected in her bank account in this scenario.
A. Confidentiality
B. Integrity
C. Non-repudiation
D. Availability
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
The incident handling and response (IH&R) team of an organization was handling a recent cyberattack on the organization's web server. Fernando, a member of the IH&P team, was tasked with eliminating the root cause of the incident and closing all attack vectors to prevent similar incidents in future. For this purpose. Fernando applied the latest patches to the web server and installed the latest security mechanisms on it. Identify the IH&R step performed by Fernando in this scenario.
A. Eradication
B. Notification
C. Containment
D. Recovery
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
Richard, a professional hacker, was hired by a marketer to gather sensitive data and information about the offline activities of users from location dat a. Richard employed a technique to determine the proximity of a user's mobile device to an exact location using CPS features. Using this technique. Richard placed a virtual barrier positioned at a static location to interact with mobile users crossing the barrier, identify the technique employed by Richard in this scenario.
A. Containerization
B. Full device encryption
C. Ceofencing
D. Over-the-air (OTA) updates
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
Paul, a computer user, has shared information with his colleague using an online application. The online application used by Paul has been incorporated with the latest encryption mechanism. This mechanism encrypts data by using a sequence of photons that have a spinning trait while traveling from one end to another, and these photons keep changing their shapes during their course through filters: vertical, horizontal, forward slash, and backslash.
Identify the encryption mechanism demonstrated in the above scenario.
A. Elliptic curve cryptography
B. Quantum cryptography
C. Rivest Shamir Adleman encryption
D. Homomorphic encryption
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
Maisie. a new employee at an organization, was given an access badge with access to only the first and third floors of the organizational premises. Maisie Hied scanning her access badge against the badge reader at the second-floor entrance but was unsuccessful. Identify the short-range wireless communication technology used by the organization in this scenario.
A. Li-Fi
B. Bluetooth
C. RFID
D. Wi Fi
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 6:
Finley, a security professional at an organization, was tasked with monitoring the organizational network behavior through the SIEM dashboard. While monitoring, Finley noticed suspicious activities in the network; thus, he captured and analyzed a single network packet to determine whether the signature included malicious patterns. Identify the attack signature analysis technique employed by Finley in this scenario.
A. Atomic-signature-based analysis
B. Content-based signature analysis
C. Composite signature-based analysis
D. Context-based signature analysis
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 7:
Warren, a member of IH&R team at an organization, was tasked with handling a malware attack launched on one of servers connected to the organization's network. He immediately implemented appropriate measures to stop the infection from spreading to other organizational assets and to prevent further damage to the organization.
Identify the IH&R step performed by Warren in the above scenario.
A. Eradication
B. Containment
C. Incident triage
D. Recovery
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
Sonoda -
212-82豊富な例題と確認問題で実力UP!