Which of the following is spy software that records activity on Macintosh systems via snapshots, keystrokes, and Web site logging?
A. NetBus
B. Magic Lantern
C. Spector
D. eblaster
正解:C
質問 2:
Which of the following netcat parameters makes netcat a listener that automatically restarts itself when a connection is dropped?
A. -u
B. -p
C. -L
D. -l
正解:C
質問 3:
An Active Attack is a type of steganography attack in which the attacker changes the carrier during the communication process. Which of the following techniques is used for smoothing the transition and controlling contrast on the hard edges, where there is significant color transition?
A. Rotate
B. Blur
C. Soften
D. Sharpen
正解:B
質問 4:
Adam is a novice Web user. He chooses a 22 letters long word from the dictionary as his
password.
How long will it take to crack the password by an attacker?
A. 5 minutes
B. 23 days
C. 200 years
D. 22 hours
正解:A
質問 5:
You want to integrate the Nikto tool with nessus vulnerability scanner. Which of the following steps will you take to accomplish the task?
Each correct answer represents a complete solution. Choose two.
A. Place nikto.pl file in the /etc/nessus directory.
B. Restart nessusd service.
C. Place the directory containing nikto.pl in root's PATH environment variable.
D. Place nikto.pl file in the /var/www directory.
正解:B,C
質問 6:
Which of the following options scans the networks for vulnerabilities regarding the security of a network?
A. Port enumerators
B. Network enumerators
C. System enumerators
D. Vulnerability enumerators
正解:B
質問 7:
Which of the following applications is an example of a data-sending Trojan?
A. eBlaster
B. SubSeven
C. Senna Spy Generator
D. Firekiller 2000
正解:A
Minase -
SEC504の模擬テストを繰返し練習だけで合格できました。
本番の設問と大体同じでしたので、楽勝でした。ありがとうございました。