John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization. Which of the following attack techniques is used by John?
A. Spear-phishing sites
B. Advanced persistent theft
C. insider threat
D. threat Diversion theft
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
Techno Security Inc. recently hired John as a penetration tester. He was tasked with identifying open ports in the target network and determining whether the ports are online and any firewall rule sets are encountered. John decided to perform a TCP SYN ping scan on the target network. Which of the following Nmap commands must John use to perform the TCP SYN ping scan?
A. nmap -sn -PS < target IP address >
B. nmap -sn -PO < target IP address >
C. nmap -sn -PA < target IP address >
D. nmap -sn -pp < target ip address >
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
Jane is working as a security professional at CyberSol Inc. She was tasked with ensuring the authentication and integrity of messages being transmitted in the corporate network. To encrypt the messages, she implemented a security model in which every user in the network maintains a ring of public keys. In this model, a user needs to encrypt a message using the receiver's public key, and only the receiver can decrypt the message using their private key. What is the security model implemented by Jane to secure corporate messages?
A. Zero trust network
B. Web of trust (WOT)
C. Secure Socket Layer (SSL)
D. Transport Layer Security (TLS)
正解:B
質問 4:
An attacker utilizes a Wi-Fi Pineapple to run an access point with a legitimate-looking SSID for a nearby business in order to capture the wireless password. What kind of attack is this?
A. MAC spoofing attack
B. War driving attack
C. Phishing attack
D. Evil-twin attack
正解:D
質問 5:
You want to analyze packets on your wireless network. Which program would you use?
A. Ethereal with Winpcap
B. Airsnort with Airpcap
C. Wireshark with Airpcap
D. Wireshark with Winpcap
正解:C
質問 6:
An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the network's external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file. What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?
A. Vulnerability scanner
B. Intrusion Prevention System (IPS)
C. Protocol analyzer
D. Network sniffer
正解:C
質問 7:
Study the snort rule given below and interpret the rule. alert tcp any any --> 192.168.1.0/24 111 (content:"|00 01 86 a5|"; msG. "mountd access";)
A. An alert is generated when a TCP packet is originated from port 111 of any IP address to the 192.168.1.0 subnet
B. An alert is generated when a TCP packet is generated from any IP on the 192.168.1.0 subnet and destined to any IP on port 111
C. An alert is generated when a TCP packet originating from any IP address is seen on the network and destined for any IP address on the 192.168.1.0 subnet on port 111
D. An alert is generated when any packet other than a TCP packet is seen on the network and destined for the 192.168.1.0 subnet
正解:C
Mashiro -
この312-50v11一つだけでかなり方向性が見えてきて自信が湧いてきました。