Which of the following cloud computing threats arises from authentication vulnerabilities, user-provisioning and de-provisioning vulnerabilities, hypervisor vulnerabilities, unclear roles and responsibilities, and misconfigurations?
A. Privilege escalation
B. Isolation failure
C. Subpoena and e discovery
D. Supply-chain failure
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
An investigator wants to extract information about the status of the network interface cards (NICs) in an organization's Windows-based systems. Identify the command-line utility that can help the investigator detect the network status.
A. PsList
B. ifconfig
C. ipconfig
D. PsLoggedOn
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
Jennifer, a forensics investigation team member, was inspecting a compromised system. After gathering all the evidence related to the compromised system, she disconnected the system from the network to stop the spread of the incident to other systems.
Identify the role played by Jennifer in the forensics investigation.
A. Evidence manager
B. Incident analyzer
C. Incident responder
D. Expert witness
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
John, a forensic officer, was working on a criminal case. He employed imaging software to create a copy of data from the suspect device on a storage medium for further investigation. For developing an image of the original data, John used a software application that does not allow an unauthorized user to alter the image content on storage media, thereby retaining an unaltered image copy.
Identify the data acquisition step performed by John in the above scenario.
A. Validated data acquisition
B. Enabled write protection on the evidence media
C. Planned for contingency
D. Sanitized the target media
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
Robert, a security specialist, was appointed to strengthen the security of the organization's network. To prevent multiple login attempts from unknown sources, Robert implemented a security strategy of issuing alerts or warning messages when multiple failed login attempts are made.
Which of the following security risks is addressed by Robert to make attempted break-ins unsuccessful?
A. Absence of account lockout for invalid session IDs
B. Weak session-ID generation
C. Indefinite session timeout
D. Small session-ID generation
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 6:
Martin, a hacker, aimed to crash a target system. For this purpose, he spoofed the source IP address with the target's IP address and sent many ICMP ECHO request packets to an IP broadcast network, causing all the hosts to respond to the received ICMP ECHO requests and ultimately crashing the target machine.
Identify the type of attack performed by Martin in the above scenario.
A. Fragmentation attack
B. Smurf attack
C. Multi vector attack
D. UDP flood attack
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 7:
Jessica, a user, wanted to access the Internet from her laptop and therefore sends a connection request to the access point. To identify the wireless client, the access point forwarded that request to a RADIUS server. The RADIUS server transmitted authentication keys to both the access point and Jessica's laptop. This key helps the access point identify a particular wireless client.
Identify the authentication method demonstrated in the above scenario.
A. Centralized authentication
B. Open system authentication
C. Null authentication
D. Shared key authentication
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 8:
Williams, a forensic specialist, was tasked with performing a static malware analysis on a suspect system in an organization. For this purpose, Williams used an automated tool to perform a string search and saved all the identified strings in a text file. After analyzing the strings, he determined all the harmful actions that were performed by malware.
Identify the tool employed by Williams in the above scenario.
A. R-Drive Image
B. Ezvid
C. ResourcesExlract
D. Snagit
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 9:
Cibel.org, an organization, wanted to develop a web application for marketing its products to the public. In this process, they consulted a cloud service provider and requested provision of development tools, configuration management, and deployment platforms for developing customized applications.
Identify the type of cloud service requested by Cibel.org in the above scenario.
A. Platform-as-a-service
B. Security-as-a-service (SECaaS)
C. Infrastructure-as-a-service (laaS)
D. identity-as-a-service (IDaaS)
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
Matsuo -
ECSS試験のテキストですが、これが実に解り易い。アプリ版も付いているので移動時の勉強にも最適