You have discovered that the ls, su and ps commands no longer function as expected.
They do not return information in a manner similar to any other Linux system. Also, the implementation of Tripwire you have installed on this server is returning new hash values.
Which of the following has most likely occurred?
A. A spyware application has been installed.
B. A SQL injection attack has occurred.
C. A root kit has been installed on the system.
D. A trojan has attacked the system.
正解:C
質問 2:
You are using a PKI solution that is based on Secure Sockets Layer (SSL). Which of the following describes the function of the asymmetric-key-encryption algorithm used?
A. It encrypts all of the data.
B. It encrypts the symmetric key.
C. It encrypts the hash code used for data integrity.
D. It encrypts the X.509 key.
正解:B
質問 3:
Which of the following is a primary weakness of asymmetric-key encryption?
A. It is reliant on the Secure Sockets Layer (SSL) standard, which has been compromised.
B. It can lead to the corruption of encrypted data during network transfer.
C. It is difficult to transfer any portion of an asymmetric key securely.
D. It is slow because it requires extensive calculations by the computer.
正解:D
質問 4:
You are creating an information security policy for your company. Which of the following activities will help you focus on creating policies for the most important resources?
A. Implementing non-repudiation
B. Auditing the firewall
C. Logging users
D. Classifying systems
正解:D
質問 5:
Which of the following standards is used for digital certificates?
A. X.509
B. DES
C. Diffie-Hellman
D. RC5
正解:A
質問 6:
Which of the following applications can help determine whether a denial-of-service attack is occurring against a network host?
A. The netstat command and a packet sniffer
B. The ps command and a network scanner
C. The ping command and User Manager
D. The iptables command and Windows desktop firewall
正解:A
安达** -
1D0-571問題集の内容が見やすく表記されていて、理解しやすかった網羅性が高い。