You have discovered that an employee has attached a modem to his telephone line and workstation. He has used this modem to dial in to his workstation, thereby bypassing your firewall. A security breach has occurred as a direct result of this activity. The employee explains that he used the modem because he had to download software for a department project. What can you do to solve this problem?
A. Conduct a needs analysis
B. Enforce your security policy
C. Reconfigure the firewall
D. Install a network-based IDS
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
What does a type 3 code 13 represent?(Choose two.
A. Destination unreachable
B. Port unreachable
C. Time exceeded
D. Network unreachable
E. Echo request
F. Administratively prohibited
正解:A,F
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
In an attempt to secure his wireless network, Bob turns off broadcasting of the SSID. He concludes that since his access points require the client computer to have the proper SSID, it would prevent others from connecting to the wireless network. Unfortunately unauthorized users are still able to connect to the wireless network.
Why do you think this is possible?
A. Bob's solution only works in ad-hoc mode.
B. The SSID is still sent inside both client and AP packets.
C. Bob forgot to turn off DHCP.
D. All access points are shipped with a default SSID.
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
The GET method should never be used when sensitive data such as credit card is being sent to a CGI program. This is because any GET command will appear in the URL, and will be logged by any servers. For example, let's say that you've entered your credit card information into a form that uses the GET method. The URL may appear like this:
https://www.xsecurity-bank.com/creditcard.asp?cardnumber=453453433532234
The GET method appends the credit card number to the URL. This means that anyone with access to a server log will be able to obtain this information. How would you protect from this type of attack?
A. Use HTTPS SSLv3 to send the data instead of plain HTTPS
B. Replace the GET with POST method when sending data
C. Encrypt the data before you send using GET method
D. Never include sensitive information in a script
正解:B
質問 5:
Which of the following is the primary objective of a rootkit?
A. It provides an undocumented opening in a program
B. It opens a port to provide an unauthorized service
C. It replaces legitimate programs
D. It creates a buffer overflow
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 6:
Which of the following is an automated vulnerability assessment tool.
A. Nmap
B. Nessus
C. Whack a Mole
D. Kismet
E. Jill32
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 7:
Once an intruder has gained access to a remote system with a valid username and password, the attacker will attempt to increase his privileges by escalating the used account to one that has increased privileges. such as that of an administrator. What would be the best countermeasure to protect against escalation of priveges?
A. Give users two passwords
B. Give users tokens
C. Give users a strong policy document
D. Give user the least amount of privileges
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 8:
What do you call a pre-computed hash?
A. Sun tables
B. Apple tables
C. Moon tables
D. Rainbow tables
正解:D
江藤** -
EC-COUNCILお陰様で合格できました。本当に助かりました。ありがとうございました。