Security+认证模拟题800.HighlysensitivedataisstoredinadatabaseandisaccessedbyanapplicationonaDMZserver.Thediskdrivesonallserversarefullyencrypted.Communicationbetweentheapplicationserverandend-usersisalsoencrypted.NetworkACLspreventanyconnectionstothedatabaseserverexceptfromtheapplicationserver.Whichofthefollowingcanstillresultinexposureofthesensitivedatainthedatabaseserver?A.SQLInjectionB.TheftofthephysicaldatabaseserverC.CookiesD.Cross-sitescripting800.高度敏感的数据存储在数据库中并被DMZ服务器上的应用程序访问。所有服务器上的磁盘驱动器都已完全加密。应用服务器和最终用户之间的通信也被加密。网络访问控制列表防止除了应用服务器外的任何连接访问数据库服务器。下列哪项仍然会导致数据库服务器中敏感数据暴露?A.SQL注入B.盗窃物理的数据库服务器C.CookiesD.跨站脚本801.Thefundamentalinformationsecurityprincipalsincludeconfidentiality,availabilityandwhichofthefollowing?A.TheabilitytosecuredataagainstunauthorizeddisclosuretoexternalsourcesB.ThecapacityofasystemtoresistunauthorizedchangestostoredinformationC.TheconfidencewithwhichasystemcanattesttotheidentityofauserD.Thecharacteristicofasystemtoprovideuninterruptedservicetoauthorizedusers801.基本信息安全原则包括保密性、可用性和下列哪项A.确保数据不会未经授权的泄露到外部的能力B.系统抵御未经授权的变更存储的信息的能力C.系统可以证明用户身份的能力D.为授权用户提供不间断服务的能力802.WhichofthefollowingistheMOSTlikelycauseofusersbeingunabletoverifyasingleuser'semailsignatureandthatuserbeingunabletodecryptsentmessages?A.UnmatchedkeypairsB.CorruptkeyescrowC.WeakpublickeyD.Weakprivatekey802.下列哪项是用户无法验证单个用户的电子邮件签名和用户无法解密发送的消息的最可能原因?A.不匹配的密钥对B.损坏密钥托管C.弱的公钥D.弱的私钥803.FulldiskencryptionisMOSTeffectiveagainstwhichofthefollowingthreats?A.DenialofservicebydatadestructionB.EavesdroppingemanationsC.MaliciouscodeD.Theftofhardware803.全盘加密是最有效的对付以下哪项威胁的手段?A.数据破坏导致不能提供服务B.电磁侦听C.恶意代码D.盗窃硬件804.WhichofthefollowingmaycauseJane,thesecurityadministrator,toseekanACLworkaround?A.ZerodayexploitB.DumpsterdivingC.VirusoutbreakD.Tailgating804.以下哪个原因可能导致安全管理员Jane使用ACL进行解决A.零日漏洞B.垃圾搜寻C.病毒爆发D.尾随805.Inordertouseatwo-waytrustmodelthesecurityadministratorMUSTimplementwhichofthefollowing?A.DACB.PKIC.HTTPSD.TPM805.为了使用双向信任模型安全管理员必须实施以下哪项?A.DACB.PKIC.HTTPSD.TPM806.Whichofthefollowingwouldasecurityadministratorusetoverifytheintegrityofafile?A.TimestampB.MACtimesC.FiledescriptorD.Hash806.安全管理员使用下列哪项来验证文件的完整性A.时间戳B.MACtimesC.文件描述符D.哈希807.Whichofthefollowingisabestpracticewhensecuringaswitchfromphysicalaccess?A.DisableunnecessaryaccountsB.PrintbaselineconfigurationC.EnableaccesslistsD.Disableunusedports807.下列哪项是确保交换机物理访问安全的最好做法?A.关闭不必要的账户B.打印基线配置C.开启访问列表D.关闭不使用的端口808.Asecurityadministratorneedstoimagealargeharddriveforforensicanalysis.Whichofthefollowingwillallowforfasterimagingtoasecondharddrive?A.cp/dev/sda/dev/sdbbs=8kB.tail-f/dev/sda/dev/sdbbs=8kC.ddin=/dev/sdaout=/dev/sdbbs=4kD.locate/dev/sda/dev/sdbbs=4k808.为进行取证分析安全管理员需要镜像一个大容量硬盘。以下哪种方法可以更快的镜像到第二块硬盘。A.cp/dev/sda/dev/sdbbs=8kB.tail-f/dev/sda/dev/sdbbs=8kC.ddin=/dev/sdaout=/dev/sdbbs=4kD.locate/dev/sda/dev/sdbbs=4k809.Sara,anemployee,tethershersmartphonetoherworkPCtobypassthecorporatewebsecuritygatewaywhileconnectedtotheLAN.WhileSaraisoutatlunchherPCiscompromisedviathetetheredconnectionandcorporatedataisstolen.WhichofthefollowingwouldBESTpreventthisfromoccurringagain?A.DisablethewirelessaccessandimplementstrictrouterACLs.B.Reducerestrictionsonthecorporatewebsecuritygateway.C.Securitypolicyandthreatawarenesstraining.D.Performuserrightsandpermissionsreviews.809.员工Sara把她的智能手机连接到她的工作电脑从而绕过公司的Web安全网关连接到局域网。当Sara出去午餐时,她的PC通过智能手机连接被攻破,公司数据被盗。为防止类似事件再次发生,最好采取下列哪项措施?A.禁用无线接入和实施严格的路由器ACLB.减少对企业网络安全网关的限制C.安全政策和威胁意识培训。D.执行用户权限和许可的审查810.Whichofthefollowingcanbeimplementedifasecurityadministratorwantsonlycertaindevicesconnectingtothewirelessnetwork?A.DisableSSIDbroadcastB.InstallaRADIUSserverC.EnableMACfilteringD.LoweringpowerlevelsontheAP810.如果安全管理员只希望某些设备连接到无线网络,那么下列哪项可以实现?A.禁用SSID广播B.安装RADIUS服务器C.启用MAC过滤D.减小AP的功率811.Whichofthefollowingmalwaretypestypicallyallowsanattackertomonitorauser'scomputer,ischaracterizedbyadrive-bydownload,andrequiresnouserinteraction?A.VirusB.LogicbombC.SpywareD.Adware811.下列哪种恶意软件类型通常允许攻击者监视用户的计算机,其特征是通过下载驱动,并且不需要用户交互A.病毒B.逻辑炸弹C.间谍软件D.广告软件812.Whichofthefollowingmalwaretypesmayrequireuserinteraction,doesnothideitself,andiscommonlyidentifiedbymarketingpop-upsbasedonbrowsinghabits?A.BotnetB.RootkitC.AdwareD.Virus812.下列哪种恶意软件类型可能需要用户交互,不隐藏自己,并且通常是基于浏览习惯弹出的营销对话框?A.僵尸网络B.RootkitC.广告软件D.病毒813.Whichofthefollowingischaracterizedbyanattackagainstamobiledevice?A.EviltwinB.HeadermanipulationC.BluejackingD.RogueAP813.下列哪个特点是对移动设备的攻击?A.EviltwinB.HeadermanipulationC.蓝牙劫持D.RogueAP814.Whichofthefollowingapplicationattacksisusedagainstacorporatedirectoryservicewherethereareunknownserversonthenetwork?A.RogueaccesspointB.ZerodayattackC.PacketsniffingD.LDAPinjection814.下列哪个应用程序攻击是针对网络上有未知服务器的企业目录服务的?A.恶意接入点B.零日攻击C.包嗅探D.LDAP注入815.WhichofthefollowingprotocolsallowsfortheLARGESTaddressspace?A.IPXB.IPv4C.IPv6D.Appletalk815.下列哪个协议允许最大的地址空间?A.IPXB.IPv4C.IPv6D.Appletalk816.WhoshouldbecontactedFIRSTintheeventofasecuritybreach?A.ForensicsanalysisteamB.InternalauditorsC.IncidentresponseteamD.Softwarevendors816.在安全漏洞事件中应该最先联系谁?A.取证分析团队B.内审人员C.事件响应团队D.软件提供商817.Asecurityadministratorexaminesanetworksessiontoacompromis