The MBR of a hard disk is a collection of boot records that contain disk information such as disk architecture, cluster size, and so on. The main work of the MBR is to locate and run necessary operating system files that are required to run a hard disk. In the context of the operating system, MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk?
Each correct answer represents a complete solution. Choose two.
A. File
B. Multipartite
C. Stealth
D. Boot sector
正解:B,D
質問 2:
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server.
Now, he suggests some countermeasures to avoid such brute force attacks on the We-are-secure server. Which of the following are countermeasures against a brute force attack?
Each correct answer represents a complete solution. Choose all that apply.
A. The site should restrict the number of login attempts to only three times.
B. The site should increase the encryption key length of the password.
C. The site should force its users to change their passwords from time to time.
D. The site should use CAPTCHA after a specific number of failed login attempts.
正解:A,D
質問 3:
You want to use PGP files for steganography. Which of the following tools will you use to accomplish the task?
A. Snow
B. Blindside
C. ImageHide
D. Stealth
正解:D
質問 4:
Which of the following is a computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic?
A. Klez
B. SQL Slammer
C. Beast
D. Code red
正解:B
質問 5:
Which of the following are considered Bluetooth security violations?
Each correct answer represents a complete solution. Choose two.
A. Cross site scripting attack
B. Bluesnarfing
C. Bluebug attack
D. SQL injection attack
E. Social engineering
正解:B,C
質問 6:
You have detected what appears to be an unauthorized wireless access point on your network. However this access point has the same MAC address as one of your real access points and is broadcasting with a stronger signal. What is this called?
A. WAP cloning
B. The evil twin attack
C. Buesnarfing
D. DOS
正解:B
質問 7:
Which of the following firewalls inspects the actual contents of packets?
A. Circuit-level firewall
B. Application-level firewall
C. Packet filtering firewall
D. Stateful inspection firewall
正解:B
斉藤** -
GSLC問題集の内容が見やすく表記されていて、理解しやすかった網羅性が高い。