Which of the following protocols is used by IPv6 for MAC address resolution?
A. NCP
B. ARP
C. NDP
D. DNS
正解:C
質問 2:
A security administrator develops a web page and limits input into their fields on the web page as well as filters special characters in output. The administrator is trying to prevent which of the following attacks?
A. Fuzzing
B. Spoofing
C. Pharming
D. XSS
正解:D
質問 3:
Matt, a systems security engineer, is determining which credential-type authentication to use within a planned 802.1x deployment. He is looking for a method that does not require a client certificate, has a server side certificate, and uses TLS tunnels for encryption. Which credential-type authentication method BEST fits these requirements?
A. PEAP-CHAP
B. PEAP-MSCHAPv2
C. EAP-TLS
D. EAP-FAST
正解:B
質問 4:
The security manager received a report that an employee was involved in illegal activity and has saved data to a workstation's hard drive. During the investigation, local law enforcement's criminal division confiscates the hard drive as evidence. Which of the following forensic procedures is involved?
A. Order of volatility
B. System image
C. Take hashes
D. Chain of custody
正解:D
質問 5:
Jane, a security administrator, has been tasked with explaining authentication services to the company's management team. The company runs an active directory infrastructure. Which of the following solutions BEST relates to the host authentication protocol within the company's environment?
A. TACACS+
B. Least privilege
C. Kerberos
D. LDAP
正解:C
質問 6:
A security administrator wants to ensure that the message the administrator sends out to their Chief Financial Officer (CFO) does not get changed in route. Which of the following is the administrator MOST concerned with?
A. Data integrity
B. Data confidentiality
C. Business continuity
D. High availability
正解:A
質問 7:
Which of the following is characterized by an attacker attempting to map out an organization's staff hierarchy in order to send targeted emails?
A. Spear phishing
B. Privilege escalation
C. Whaling
D. Impersonation
正解:C
質問 8:
Matt, an administrator, is concerned about the wireless network being discovered by war driving. Which of the following can be done to mitigate this?
A. Enforce a policy for all users to authentic through a biometric device.
B. Move all access points into public access areas.
C. Ensure all access points are running the latest firmware.
D. Disable all SSID broadcasting.
正解:D
田泽** -
出題分野を体系的に幅広く網羅し、側注付きでJK0-018理解しやすい参考書だ。