Using Linux to carry out a forensics investigation, what would the following command accomplish?
dd if=/usr/home/partition.image of=/dev/sdb2 bs=4096 conv=notrunc,noerror
A. Copy a partition to an image file
B. Backup a disk to an image file
C. Restore a disk from an image file
D. Search for disk errors within an image file
正解:C
質問 2:
What is the slave device connected to the secondary IDE controller on a Linux OS referred to?
A. hda
B. hdc
C. hdb
D. hdd
正解:D
質問 3:
You are the security analyst working for a private company out of France. Your current assignment is to obtain credit card information from a Swiss bank owned by that company. After initial reconnaissance, you discover that the bank security defenses are very strong and would take too long to penetrate. You decide to get the information by monitoring the traffic between the bank and one of its subsidiaries in London. After monitoring some of the traffic, you see a lot of FTP packets traveling back and forth. You want to sniff the traffic and extract usernames and passwords. What tool could you use to get this information?
A. Airsnort
B. Ettercap
C. RaidSniff
D. Snort
正解:B
質問 4:
What type of attack sends SYN requests to a target system with spoofed IP addresses?
A. Ping of death
B. Land
C. Cross site scripting
D. SYN flood
正解:D
質問 5:
What must an attorney do first before you are called to testify as an expert?
A. Prove that the tools you used to conduct your examination are perfect
B. Engage in damage control
C. Qualify you as an expert witness
D. Read your curriculum vitae to the jury
正解:C
質問 6:
In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers to mimic the backbone of the Internet. This project will help him write his doctoral thesis on "bringing down the Internet". Without sniffing the traffic between the routers, Michael sends millions of RESET packets to the routers in an attempt to shut one or all of them down. After a few hours, one of the routers finally shuts itself down. What will the other routers communicate between themselves?
A. The change in the routing fabric to bypass the affected router
B. STOP packets to all other routers warning of where the attack originated
C. RESTART packets to the affected router to get it to power back up
D. More RESET packets to the affected router to get it to power back up
正解:A
質問 7:
MAC filtering is a security access control methodology, where a ___________ is assigned to each network card to determine access to the network.
A. 48-bit address
B. 32-bit address
C. 16-bit address
D. 24-bit address
正解:A
質問 8:
Diskcopy is:
A. a utility by AccessData
B. a standard MS-DOS command
C. dd copying tool
D. Digital Intelligence utility
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
Sawada -
312-49v9のアプリバージョンすごいね。携帯でも簡単に問題集の練習ができるし、普段電車に乗るときもすっと見てた。そのお陰で、試験に合格しました。便利で分かりやすい!