The systems administrator wishes to implement a hardware-based encryption method that could also be used to sign code. They can achieve this by:
A. Utilizing the already present TPM.
B. Configuring secure application sandboxes.
C. Enforcing whole disk encryption.
D. Moving data and applications into the cloud.
正解:A
質問 2:
During a server audit, a security administrator does not notice abnormal activity. However, a network security analyst notices connections to unauthorized ports from outside the corporate network. Using specialized tools, the network security analyst also notices hidden processes running. Which of the following has MOST likely been installed on the server?
A. Rootkit
B. Logic bomb
C. SPIM
D. Backdoor
正解:A
質問 3:
Which of the following is an important implementation consideration when deploying a wireless network that uses a shared password?
A. EAP method
B. Key length
C. Server certificate
D. Authentication server
正解:B
質問 4:
A security administrator has configured FTP in passive mode. Which of the following ports should the security administrator allow on the firewall by default?
A. 23
B. 21
C. 20
D. 22
正解:B
質問 5:
Which of the following are used to implement VPNs? (Select TWO).
A. HTTPS
B. SFTP
C. SSL
D. IPSec
E. SNMP
正解:C,D
質問 6:
After visiting a website, a user receives an email thanking them for a purchase which they did not request. Upon investigation the security administrator sees the following source code in a pop-up window:
<HTML>
<body onload="document.getElementByID('badForm').submit()">
<form id="badForm" action="shoppingsite.company.com/purchase.php" method="post"
<input name="Perform Purchase" value="Perform Purchase" />
</form></body></HTML>
Which of the following has MOST likely occurred?
A. XSRF
B. SQL injection
C. Cookie stealing
D. XSS
正解:A
質問 7:
After a recent breach, the security administrator performs a wireless survey of the corporate network. The security administrator notices a problem with the following output:
MACSSIDENCRYPTIONPOWERBEACONS
00:10:A1:36:12:CCMYCORPWPA2 CCMP601202
00:10:A1:49:FC:37MYCORPWPA2 CCMP709102
FB:90:11:42:FA:99MYCORPWPA2 CCMP403031
00:10:A1:AA:BB:CCMYCORPWPA2 CCMP552021
00:10:A1:FA:B1:07MYCORPWPA2 CCMP306044
Given that the corporate wireless network has been standardized, which of the following attacks is underway?
A. Evil twin
B. Rogue AP
C. IV attack
D. DDoS
正解:A
質問 8:
Several employee accounts appear to have been cracked by an attacker. Which of the following should the security administrator implement to mitigate password cracking attacks? (Select TWO).
A. Increase password complexity
B. Implement password history
C. Implement monitoring of logins
D. Deploy an IDS to capture suspicious logins
E. Implement password expiration
F. Increase password length
正解:A,F
Honda -
CompTIAさんのJK0-018問題集の品質は最高すぎます。この問題集を覚えて受験して、無事、合格することができました。感謝感激です。