Sniffers that place NICs in promiscuous mode work at what layer of the OSI model?
A. Data Link
B. Physical
C. Transport
D. Network
正解:B
質問 2:
Julie is a college student majoring in Information Systems and Computer Science. She is currently writing an essay for her computer crimes class. Julie paper focuses on white- collar crimes in America and how forensics investigators investigate the cases. Julie would like to focus the subjectJulie? paper focuses on white-collar crimes in America and how forensics investigators investigate the cases. Julie would like to focus the subject of the essay on the most common type of crime found in corporate America. What crime should
Julie focus on?
A. Industrial espionage
B. Physical theft
C. Copyright infringement
D. Denial of Service attacks
正解:A
質問 3:
What feature of Decryption Collection allows an investigator to crack a password as quickly as possible?
A. Cracks every password in 10 minutes
B. Support for Encrypted File System
C. Support for MD5 hash verification
D. Distribute processing over 16 or fewer computers
正解:D
質問 4:
You have been called in to help with an investigation of an alleged network intrusion. After questioning the members of the company ITYou have been called in to help with an investigation of an alleged network intrusion. After questioning the members of the company? IT department, you search through the server log files to find any trace of the intrusion. After that you decide to telnet into one of the company routers to see if there is any evidence to be found. While connected to the router, you see some unusual activity and believe that the attackers are currently connected to that router. You start up an ethereal session to begin capturing traffic on the router that could be used in the investigation. At what layer of the OSI model are you monitoring while watching traffic to and from the router?
A. Session
B. Data Link
C. Transport
D. Network
正解:D
質問 5:
What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the casual observer?
A. Rootkit
B. Key escrow
C. Offset
D. Steganography
正解:D
質問 6:
The use of warning banners helps a company avoid litigation by overcoming an employees assumed _________ when connecting to the company intranet, network, or virtual private network (VPN) and will allow the company investigators to monitor, search, and retrievecompany? intranet, network, or virtual private network (VPN) and will allow the company? investigators to monitor, search, and retrieve information stored within the network.
A. Right of free speech
B. Right of privacy
C. Right to work
D. Right to Internet access
正解:B
質問 7:
Jones had been trying to penetrate a remote production system for the past two weeks.
This time however, he is able to get into the system. He was able to use the system for a period of three weeks. However law enforcement agencies were recording his every activity and this was later presented as evidence. The organization had used a virtual environment to trap Jones. What is a virtual environment?
A. A honeypot that traps hackers
B. An environment set up after the user logs in
C. A system using Trojaned commands
D. An environment set up before an user logs in
正解:A
渡辺** -
受かることを優先しようとおもえば、模擬試験を反復すれば、この312-49で大丈夫でした!ありがとうございます!とにかくわかりやすい!