Which of the following protocols cannot be used to filter VoIP traffic?
A. Real-Time Publish Subscribe (RTPS)
B. Session Description Protocol (SDP)
C. Media Gateway Control Protocol (MGCP)
D. Real-time Transport Control Protocol (RTCP)
正解:A
質問 2:
Vulnerability assessment is an examination of the ability of a system or application, including the current security procedures and controls, to withstand assault.

What does a vulnerability assessment identify?
A. Disgruntled employees
B. Organizational structure
C. Weaknesses that could be exploited
D. Physical security breaches
正解:C
質問 3:
A firewall's decision to forward or reject traffic in network filtering is dependent upon which of the following?
A. Port numbers
B. Source address
C. Protocol used
D. Destination address
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
What are the 6 core concepts in IT security?

A. Passwords, logins, access controls, restricted domains, configurations, and tunnels
B. Authentication, authorization, confidentiality, integrity, availability, and non-repudiation
C. Biometrics, cloud security, social engineering, DoS attack, viruses, and Trojans
D. Server management, website domains, firewalls, IDS, IPS, and auditing
正解:B
質問 5:
If a web application sends HTTP cookies as its method for transmitting session tokens, it may be vulnerable which of the following attacks?
A. Session Hijacking
B. Cross-site request attack
C. Parameter tampering Attack
D. Sql injection attack
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 6:
Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.

What characteristics do phishing messages often have that may make them identifiable?
A. Suspiciously good grammar and capitalization
B. They trigger warning pop-ups
C. Invalid email signatures or contact information
D. Suspicious attachments
正解:D
質問 7:
Which of the following documents helps in creating a confidential relationship between the pen tester and client to protect critical and confidential information or trade secrets?
A. Liability Insurance
B. Rules of Behavior Agreement
C. Non-Disclosure Agreement
D. Penetration Testing Agreement
正解:C
井上** -
Pass4Testの問題集は、短時間内に受験したい人におすすめだな。すべての問題を暗記して言ったら絶対合格すると思うよ。