최신 Security+ JK0-018 무료샘플문제:
1. Which of the following types of wireless attacks would be used specifically to impersonate another WAP in order to gain unauthorized information from mobile users?
A) War driving
B) Rogue access point
C) IV attack
D) Evil twin
2. Various network outages have occurred recently due to unapproved changes to network and security devices. All changes were made using various system credentials. The security analyst has been tasked to update the security policy. Which of the following risk mitigation strategies would also need to be implemented to reduce the number of network outages due to unauthorized changes?
A) Configuration management
B) User rights and permissions review
C) Implement security controls on Layer 3 devices
D) Incident management
3. Pete, a developer, writes an application. Jane, the security analyst, knows some things about the overall application but does not have all the details. Jane needs to review the software before it is released to production. Which of the following reviews should Jane conduct?
A) White Box Testing
B) Gray Box Testing
C) Black Box Testing
D) Business Impact Analysis
4. A small company has a website that provides online customer support. The company requires an account recovery process so that customers who forget their passwords can regain access. Which of the following is the BEST approach to implement this process?
A) Web-based form that identifies customer by another mechanism and then emails the customer their forgotten password.
B) Web-based form that identifies customer by another mechanism, sets a temporary password and forces a password change upon first login.
C) Replace passwords with hardware tokens which provide two-factor authentication to the online customer support site.
D) Require the customer to physically come into the company's main office so that the customer can be authenticated prior to their password being reset.
5. The fundamental information security principals include confidentiality, availability and which of the following?
A) The confidence with which a system can attest to the identity of a user
B) The capacity of a system to resist unauthorized changes to stored information
C) The ability to secure data against unauthorized disclosure to external sources
D) The characteristic of a system to provide uninterrupted service to authorized users
질문과 대답:
질문 # 1 정답: D | 질문 # 2 정답: B | 질문 # 3 정답: B | 질문 # 4 정답: B | 질문 # 5 정답: B |