The IH&R team in an organization was handling a recent malware attack on one of the hosts connected to the organization's network. Edwin, a member of the IH&R team, was involved in reinstating lost data from the backup media. Before performing this step, Edwin ensured that the backup does not have any traces of malware.
Identify the IH&R step performed by Edwin in the above scenario.
A. Eradication
B. Notification
C. Incident containment
D. Recovery
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
A web application www.movieabc.com was found to be prone to SQL injection attack. You are given a task to exploit the web application and fetch the user credentials. Select the UID which is mapped to user john in the database table.
Note:
Username: sam
Pass: test
A. 4
B. 5
C. 3
D. 2
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
A software company develops new software products by following the best practices for secure application development. Dawson, a software analyst, is responsible for checking the performance of applications in the client's network to determine any issue faced by end users while accessing the application.
Which of the following tiers of the secure application development lifecycle involves checking the application performance?
A. Development
B. Testing
C. Quality assurance (QA)
D. Staging
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
As a Virtualization Software Engineer/Analyst, you are employed on a Project with Alpha Inc. Company, the OS Virtualization is used for isolation of Physical/Base OS with the Hypervisor OS. What is the security benefit of OS virtualization in terms of isolation?
A. A compromised virtual machine can easily infect the physical host and other VMs.
B. Virtual machines can freely access the resources of other VMs on the same host.
C. Virtual machines are isolated from each other, preventing a security breach in one from impacting others.
D. OS virtualization offers no security benefits in isolation.
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
Analyze the executable file ShadowByte.exe located in the Downloads folder of the Attacker Machine-I and determine the Linker Info value of the file. (Practical Question)
A. 3.5
B. 2.25
C. 04.25
D. 6.2
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 6:
An organization's risk management team identified the risk of natural disasters in the organization's current location. Because natural disasters cannot be prevented using security controls, the team suggested to build a new office in another location to eliminate the identified risk. Identify the risk treatment option suggested by the risk management team in this scenario.
A. Risk avoidance
B. Risk retention
C. Risk sharing
D. Risk modification
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 7:
SecuraCorp, a leading financial institution, is worried about zero-day vulnerabilities. With a sprawling network infrastructure and multiple transaction points, it needs a system that does not solely rely on signatures but can effectively identify suspicious patterns based on the behavior in the network. Which type of IDS/IPS should SecuraCorp primarily deploy for its needs?
A. Anomaly-based IDS
B. Signature-based IDS
C. Host-based IDS
D. Network-based IDS
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
上杉** -
最新の本試験問題で到達度を確認できるテキストで、212-82合格に必要な基礎がしっかり身につきました。