During a security audit of IT processes, an IS auditor found that there was no documented security procedures. What should the IS auditor do?
A. Terminate the audit.
B. Identify and evaluate existing practices.
C. Create a procedures document
D. Conduct compliance testing
正解:B
質問 2:
Using Windows CMD, how would an attacker list all the shares to which the current user context hasaccess?
A. NET CONFIG
B. NET USE
C. NET FILE
D. NET VIEW
正解:D
質問 3:
The configuration allows a wired or wireless network interface controller to pass all trafice it receives to thecentral processing unit (CPU), rather than passing only the frames that the controller is intended to receive.
Which of the following is being described?
A. Port forwarding
B. Multi-cast mode
C. Promiscuous mode
D. WEM
正解:B
質問 4:
Which of the following describes the characteristics of a Boot Sector Virus?
A. Overwrites the original MBR and only executes the new virus code
B. Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR
C. Moves the MBR to another location on the RAM and copies itself to the original location of the MBR
D. Modifies directory table entries so that directory entries point to the virus code instead of the actual program
正解:B
質問 5:
This asymmetry cipther is based on factoring the product of two large prime numbers. What cipher is described above?
A. RSA
B. SHA
C. MD5
D. RC5
正解:A
真咲** -
模擬テストにひたすら受けてて、受験して簡単に合格することができました。Pass4Testさん、ありがとうございました。