Mark works as a Network Security Administrator for uCertify Inc. An employee of the organization comes to Mark and tells him that a few months ago, the employee had filled an online bank form due to some account related work. Today, when again visiting the site, the employee finds that some of his personal information is still being displayed in the webpage. Which of the following types of cookies should be disabled by Mark to resolve the issue?
A. Session
B. Temporary
C. Secure
D. Persistent
正解:D
質問 2:
In which of the following social engineering attacks does an attacker first damage any part of the target's equipment and then advertise himself as an authorized person who can help fix the problem.
A. In person attack
B. Reverse social engineering attack
C. Impersonation attack
D. Important user posing attack
正解:B
質問 3:
Which of the following is used to align and realign IT Services to changing business needs by identifying and implementing improvements to IT services?
A. Continual Service Improvement (CSI)
B. Recovery Point Objective (RPO)
C. Business Continuity Plan (BCP)
D. Business Impact Analysis (BIA)
正解:A
質問 4:
Which of the following are the malicious activities that can be performed by a bot/botnet?
Each correct answer represents a complete solution. Choose all that apply.
A. It can be malicious File-name modifiers on anonymous file-sharing
B. It can perform DDoS attacks.
C. It can work as spambots that harvest email addresses from contact forms or guestbook pag es.
D. It can work as virus or as a worm.
正解:B,C,D
質問 5:
Which of the following honeypots provides an attacker access to the real operating system without any restriction and collects a vast amount of information about the attacker?
A. High-interaction honeypot
B. Honeyd
C. Low-interaction honeypot
D. Medium-interaction honeypot
正解:A
伊藤** -
G2700試験参考書が本当に助かりました。誠にありがとうございました。