최신 Web Security Series 1D0-671 무료샘플문제:
1. Which of the following details should be included in documentation of an attack?
A) The network resources involved in the attack, and recommendations for thwarting future attacks
B) Estimates of how much the attack cost the company, and a list of the applications used by the attacker
C) The time and date of the attack, and the names of employees who were contacted during the response
D) An overview of the security policy and suggestions for the next response plan
2. Which attribute of a security matrix considers the number of employees necessary to successfully implement and maintain your system?
A) Ease of use
B) Appropriate cost of ownership
C) Flexibility and scalability
D) Access control
3. Consider the following image of a packet capture:
Which of the following best describes the protocol used, along with its primary benefit?
A) It is an active FTP session, which is necessary in order to support IPv6.
B) It is an extended passive FTP session, which is necessary to support IPv6.
C) It is an active FTP session, which is supported by all FTP clients.
D) It is a passive FTP session, which is easier for firewalls to process.
4. Which of the following is the most likely first step to enable a server to recover from a denial-of- service attack in which all hard disk data is lost?
A) Contact the backup service
B) Enable virtualization
C) Contact a disk recovery service
D) Rebuild your RAID 0 array
5. You have been assigned to configure a DMZ that uses multiple firewall components. Specifically, you must configure a router that will authoritatively monitor and, if necessary, block traffic. This device will be the last one that inspects traffic before it passes to the internal network.
Which term best describes this device?
A) Screening router
B) Bastion host
C) Choke router
D) Proxy server
질문과 대답:
질문 # 1 정답: C | 질문 # 2 정답: B | 질문 # 3 정답: D | 질문 # 4 정답: A | 질문 # 5 정답: C |