The Chief Executive Officer (CEO) of an Internet service provider (ISP) has decided to limit the company's contribution to worldwide Distributed Denial of Service (DDoS) attacks. Which of the following should the
ISP implement? (Select TWO).
A. Prevent the ISP's customers from querying DNS servers other than those hosted by the ISP.
B. Block traffic with an IP source not allocated to customers from exiting the ISP's network.
C. Block traffic from the ISP's networks destined for blacklisted IPs.
D. Scan the ISP's customer networks using an up-to-date vulnerability scanner.
E. Notify customers when services they run are involved in an attack.
正解:B,E
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
A business wants to start using social media to promote the corporation and to ensure that customers have a good experience with their products. Which of the following security items should the company have in place before implementation? (Select TWO).
A. The finance department must provide a cost benefit analysis for social media.
B. The company must dedicate specific staff to act as social media representatives of the company.
C. All staff needs to be instructed in the proper use of social media in the work environment.
D. Senior staff biogs should be ghost written by marketing professionals.
E. The company should ensure that the company has sufficient bandwidth to allow for social media traffic.
F. The security policy needs to be reviewed to ensure that social media policy is properly implemented.
正解:B,F
質問 3:
A security engineer is working on a large software development project. As part of the design of the project, various stakeholder requirements were gathered and decomposed to an implementable and testable level. Various security requirements were also documented.
Organize the following security requirements into the correct hierarchy required for an SRTM.
Requirement 1: The system shall provide confidentiality for data in transit and data at rest.
Requirement 2: The system shall use SSL, SSH, or SCP for all data transport.
Requirement 3: The system shall implement a file-level encryption scheme.
Requirement 4: The system shall provide integrity for all data at rest.
Requirement 5: The system shall perform CRC checks on all files.
A. Level 1: Requirements 1 and 4; Level 2: Requirements 2, 3, and 5
B. Level 1: Requirements 1, 2, and 3; Level 2: Requirements 4 and 5
C. Level 1: Requirements 1 and 4; Level 2: Requirement 2 under 1, Requirement 5 under 4; Level 3:
Requirement 3 under 2
D. Level 1: Requirements 1 and 4; Level 2: Requirements 2 and 3 under 1, Requirement 5 under 4
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
A security administrator wants to prevent sensitive data residing on corporate laptops and desktops from leaking outside of the corporate network. The company has already implemented full-disk encryption and has disabled all peripheral devices on its desktops and laptops. Which of the following additional controls
MUST be implemented to minimize the risk of data leakage? (Select TWO).
A. Split-tunnel VPN should be enforced when transferring sensitive data.
B. A DLP gateway should be installed at the company border.
C. Full-tunnel VPN should be required for all network communication.
D. A full-system backup should be implemented to a third-party provider with strong encryption for data in transit.
E. Full-drive file hashing should be implemented with hashes stored on separate storage.
F. Strong authentication should be implemented via external biometric devices.
正解:B,C
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
Company A is merging with Company B.
Company B uses mostly hosted services from an outside vendor, while Company A uses mostly in-house products. The project manager of the merger states the merged systems should meet these goals:
Ability to customize systems per department
Quick implementation along with an immediate ROI
The internal IT team having administrative level control over all products
The project manager states the in-house services are the best solution. Because of staff shortages, the senior security administrator argues that security will be best maintained by continuing to use outsourced services. Which of the following solutions BEST solves the disagreement?
A. Calculate the time to deploy and support the in-sourced systems accounting for the staff shortage and compare the costs to the ROI costs minus outsourcing costs. Present the document numbers to management for a final decision.
B. Raise the issue to the Chief Executive Officer (CEO) to escalate the decision to senior management with the recommendation to continue the outsourcing of all IT services.
C. Perform a detailed cost benefit analysis of outsourcing vs. in-sourcing the IT systems and review the system documentation to assess the ROI of in-sourcing. Select COTS products to eliminate development time to meet the ROI goals.
D. Arrange a meeting between the project manager and the senior security administrator to review the requirements and determine how critical all the requirements are.
正解:A
Tanaka -
試験の全範囲を網羅するオリジナル問題集です。
問題も解説も良質なので、たくさん問題を解いておきたい方にはおすすめできますね。
しかも試験の問題にも入ていて、高得点で受かりました。