Garry is a network administrator in an organization. He uses SNMP to manage networked devices from a remote location. To manage nodes in the network, he uses MIB. which contains formal descriptions of all network objects managed by SNMP. He accesses the contents of MIB by using a web browser either by entering the IP address and Lseries.mlb or by entering the DNS library name and Lseries.mlb. He is currently retrieving information from an MIB that contains object types for workstations and server services. Which of the following types of MIB is accessed by Garry in the above scenario?
A. MIB_II.MIB
B. LNMIB2.MIB
C. WINS.MIB
D. DHCP.MIS
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator's Computer to update the router configuration. What type of an alert is this?
A. True negative
B. False positive
C. True positive
D. False negative
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?
A. Delete the files and try to determine the source
B. Perform a trap and trace
C. Copy the system files from a known good system
D. Reload from a previous backup
E. Reload from known good media
正解:E
質問 4:
A skilled ethical hacker was assigned to perform a thorough OS discovery on a potential target. They decided to adopt an advanced fingerprinting technique and sent a TCP packet to an open TCP port with specific flags enabled. Upon receiving the reply, they noticed the flags were SYN and ECN-Echo. Which test did the ethical hacker conduct and why was this specific approach adopted?
A. Test 3: The test was executed to observe the response of the target system when a packet with URG, PSH, SYN, and FIN flags was sent, thereby identifying the OS
B. Test 6; The hacker selected this test because a TCP packet with the ACK flag enabled sent to a closed TCP port would yield more information about the OS
C. Test 2: This test was chosen because a TCP packet with no flags enabled is known as a NULL packet and this would allow the hacker to assess the OS of the target
D. Qrest 1: The test was conducted because SYN and ECN-Echo flags enabled to allow the hacker to probe the nature of the response and subsequently determine the OS fingerprint
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
While testing a web application in development, you notice that the web server does not properly ignore the
"dot dot slash" (../) character string and instead returns the file listing of a folder structure of the server.
What kind of attack is possible in this scenario?
A. Cross-site scripting
B. SQL injection
C. Denial of service
D. Directory traversal
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 6:
The Heartbleed bug was discovered in 2014 and is widely referred to under MITRE's Common Vulnerabilities and Exposures (CVE) as CVE-2014-0160. This bug affects the OpenSSL implementation of the Transport Layer Security (TLS) protocols defined in RFC6520.
What type of key does this bug leave exposed to the Internet making exploitation of any compromised system very easy?
A. Root
B. Public
C. Shared
D. Private
正解:D
質問 7:
Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations.
Bob also concluded that DMZ makes sense just when a stateful firewall is available, which is not the case of TPNQM SA.
In this context, what can you say?
A. Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations
B. Bob can be right since DMZ does not make sense when combined with stateless firewalls
C. Bob is partially right. DMZ does not make sense when a stateless firewall is available
D. Bob is partially right. He does not need to separate networks if he can create rules by destination IPs, one by one
正解:A
質問 8:
Nathan is testing some of his network devices. Nathan is using Macof to try and flood the ARP cache of these switches.
If these switches' ARP cache is successfully flooded, what will be the result?
A. If the ARP cache is flooded, the switches will drop into pix mode making it less susceptible to attacks.
B. Depending on the switch manufacturer, the device will either delete every entry in its ARP cache or reroute packets to the nearest switch.
C. The switches will route all traffic to the broadcast address created collisions.
D. The switches will drop into hub mode if the ARP cache is successfully flooded.
正解:D
質問 9:
This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as GCMP-2S6. MMAC-SHA384, and ECDSA using a 384-bit elliptic curve.
Which is this wireless security protocol?
A. WPA3-Personal
B. WPA2-Enterprise
C. WPA2 Personal
D. WPA3-Enterprise
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
Hosaka -
この312-50v12の本と過去問で1週間で合格できた。初心者の勉強意欲を阻害しかねません。安心します。