In which log collection mechanism, the system or application sends log records either on the local disk or over the network.
A. push-based
B. pull-based
C. signature-based
D. rule-based
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
An attacker exploits the logic validation mechanisms of an e-commerce website. He successfully purchases a product worth $100 for $10 by modifying the URL exchanged between the client and the server.
Original
URL: http://www.buyonline.com/product.aspx?profile=12
&debit=100
Modified URL: http://www.buyonline.com/product.aspx?profile=12
&debit=10
Identify the attack depicted in the above scenario.
A. SQL Injection Attack
B. Denial-of-Service Attack
C. Session Fixation Attack
D. Parameter Tampering Attack
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
What is the process of monitoring and capturing all data packets passing through a given network using different tools?
A. DNS Footprinting
B. Port Scanning
C. Network Scanning
D. Network Sniffing
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
In which of the following incident handling and response stages, the root cause of the incident must be found from the forensic results?
A. Evidence Gathering
B. Eradication
C. Evidence Handling
D. Systems Recovery
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
If the SIEM generates the following four alerts at the same time:
I.Firewall blocking traffic from getting into the network alerts
II.SQL injection attempt alerts
III.Data deletion attempt alerts
IV.Brute-force attempt alerts
Which alert should be given least priority as per effective alert triaging?
A. IV
B. II
C. III
D. I
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 6:
Harley is working as a SOC analyst with Powell Tech. Powell Inc. is using Internet Information Service (IIS) version 7.0 to host their website.
Where will Harley find the web server logs, if he wants to investigate them for any anomalies?
A. SystemDrive%\LogFiles\inetpub\logs\W3SVCN
B. SystemDrive%\inetpub\logs\LogFiles\W3SVCN
C. SystemDrive%\ inetpub\LogFiles\logs\W3SVCN
D. %SystemDrive%\LogFiles\logs\W3SVCN
正解:B
質問 7:
The threat intelligence, which will help you, understand adversary intent and make informed decision to ensure appropriate security in alignment with risk.
What kind of threat intelligence described above?
A. Tactical Threat Intelligence
B. Functional Threat Intelligence
C. Operational Threat Intelligence
D. Strategic Threat Intelligence
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 8:
Identify the HTTP status codes that represents the server error.
A. 4XX
B. 5XX
C. 1XX
D. 2XX
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 9:
Which of the following formula represents the risk?
A. Risk = Likelihood × Consequence × Severity
B. Risk = Likelihood × Severity × Asset Value
C. Risk = Likelihood × Impact × Asset Value
D. Risk = Likelihood × Impact × Severity
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
可爱** -
EC-COUNCILの問題集を購入させて312-39の試験に受かりました。まるで嘘のような的中率でした。ありがとうございます。