CAS-003 문제 486
select id, firstname, lastname from authors
User input= firstname= Hack;man
lastname=Johnson
Which of the following types of attacks is the user attempting?
User input= firstname= Hack;man
lastname=Johnson
Which of the following types of attacks is the user attempting?
CAS-003 문제 487
While attending a meeting with the human resources department, an organization's information security officer sees an employee using a username and password written on a memo pad to log into a specific service. When the information security officer inquires further as to why passwords are being written down, the response is that there are too many passwords to remember for all the different services the human resources department is required to use.
Additionally, each password has specific complexity requirements and different expiration time frames.
Which of the following would be the BEST solution for the information security officer to recommend?
Additionally, each password has specific complexity requirements and different expiration time frames.
Which of the following would be the BEST solution for the information security officer to recommend?
CAS-003 문제 488
A systems administrator receives an advisory email that a recently discovered exploit is being used in another country and the financial institutions have ceased operations while they find a way to respond to the attack.
Which of the following BEST describes where the administrator should look to find information on the attack to determine if a response must be prepared for the systems? (Choose two.)
Which of the following BEST describes where the administrator should look to find information on the attack to determine if a response must be prepared for the systems? (Choose two.)
CAS-003 문제 489
An administrator has noticed mobile devices from an adjacent company on the corporate wireless network.
Malicious activity is being reported from those devices. To add another layer of security in an enterprise
environment, an administrator wants to add contextual authentication to allow users to access enterprise
resources only while present in corporate buildings. Which of the following technologies would accomplish
this?
Malicious activity is being reported from those devices. To add another layer of security in an enterprise
environment, an administrator wants to add contextual authentication to allow users to access enterprise
resources only while present in corporate buildings. Which of the following technologies would accomplish
this?
CAS-003 문제 490
조직의 모바일 장치 인벤토리는 최근 장치의 베이스밴드를 제어하는 데 사용되는 코드에서 제로 데이 취약점이 식별되었다는 알림을 제공했습니다. 장치 제조업체는 패치를 신속하게 처리하고 있지만 출시에는 몇 개월이 소요됩니다. 또한 최근 해외 여행에서 돌아온 여러 모바일 사용자가 휴대전화에 알 수 없는 응용 프로그램이 포함되어 장치 성능이 저하되고 있다고 보고합니다. 장치 다음 중 패치가 릴리스될 때까지 가장 많이 발생했으며 완화 기능을 제공하는 것은 무엇입니까?