Kevin, an attacker, is attempting to compromise a cloud server. In this process, Kevin intercepted the SOAP messages transmitted between a user and the server, manipulated the body of the message, and then redirected it to the server as a legitimate user to gain access and run malicious code on the cloud server.
Identify the attack initiated by Kevin on the target cloud server.
A. Cross guest VM breaches
B. Wrapping attack
C. Side-channel attack
D. DNS spoofing
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
Which of the following environmental controls options saves the hardware from humidity and heat, increases hardware performance, and maintains consistent room temperature?
A. Lighting system
B. Hot and cold aisles
C. Temperature indicator
D. EMI shielding
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
An investigator wants to extract information about the status of the network interface cards (NICs) in an organization's Windows-based systems. Identify the command-line utility that can help the investigator detect the network status.
A. PsList
B. ifconfig
C. ipconfig
D. PsLoggedOn
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
Sandra, a hacker, targeted Johana, a software professional, to steal her banking details. She started sending frequent, random pop-up messages with malicious links to her social media page. Johana accidentally clicked on a link, causing a malicious program to get installed in her system. Subsequently, when Johana attempted to access her banking website, the URL directed her to a malicious website controlled by Sandra. Johana entered her banking credentials on the fake website, which Sandra then captured.
Identify the type of attack performed by Sandra on Johana.
A. Dumpster diving
B. Tailgating
C. Pharming
D. Shoulder surfing
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
Mary was surfing the Internet, and she wanted to hide her details and the content she was surfing over the web.
She employed a proxy tool that makes his online activity untraceable.
Identify the type of proxy employed by John in the above scenario.
A. Reverse proxy
B. SOCKS proxy
C. Explicit proxy
D. Anonvmous proxy
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 6:
Daniel, a professional hacker, targeted Alice and lured her into downloading a malicious app from a third-party app store. Upon installation, the core malicious code inside the application started infecting other legitimate apps in Alice's mobile device. Daniel overloaded Alice's device with irrelevant and fraudulent advertisements through the infected app for financial gain.
Identify the type of attack Daniel has launched in the above scenario.
A. Agent Smith attack
B. SIM card attack
C. Bluebugging attack
D. SMiShing attack
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 7:
Melanie, a professional hacker, is attempting to break into a target network through an application server. In this process, she identified a logic flaw in the target web application that provided visibility into the source code. She exploited this vulnerability to launch further attacks on the target web application.
Which of the web application vulnerabilities was identified by Melanie in the above scenario?
A. Command injection
B. Broken authentication
C. Insecure deserialization
D. Security misconfiguration
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 8:
Bob, a forensic investigator, is investigating a live Windows system found at a crime scene. In this process, Bob extracted subkeys containing information such as SAM. Security, and software using an automated tool called FTK Imager.
Which of the following Windows Registry hives' subkeys provide the above information to Bob?
A. HKEY LOCAL MACHINE
B. HKEY CURRENT USER
C. H KEY-CLASSES. ROOT
D. HKEY .CURRENT CONFIG
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 9:
Messy, a network defender, was hired to secure an organization's internal network. He deployed an IDS in which the detection process depends on observing and comparing the observed events with the normal behavior and then detecting any deviation from it.
Identify the type of IDS employed by Messy in the above scenario.
A. Signature-based
B. Application proxy
C. Stateful protocol analysis
D. Anomaly-based
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
沙原** -
二回目で合格することができました。カスタマーサービスのアドバイス通りに勉強したことで、合格することができました。どうもありがとうございました。