312-50v13 문제 191

The Payment Card Industry Data Security Standard (PCI DSS) contains six different categories of control objectives. Each objective contains one or more requirements, which must be followed in order to achieve compliance. Which of the following requirements would best fit under the objective, "Implement strong access control measures"?

312-50v13 문제 192

Kate dropped her phone and subsequently encountered an issue with the phone's internal speaker. Thus, she is using the phone's loudspeaker for phone calls and other activities. Bob, an attacker, takes advantage of this vulnerability and secretly exploits the hardware of Kate's phone so that he can monitor the loudspeaker's output from data sources such as voice assistants, multimedia messages, and audio files by using a malicious app to breach speech privacy. What is the type of attack Bob performed on Kate in the above scenario?

312-50v13 문제 193

An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the network's external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file.
What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?

312-50v13 문제 194

이 암호화 알고리즘은 비대칭 키 블록 암호로, 블록 크기는 128비트이고 키 크기는 최대 256비트입니다. 다음 중 이 암호화 알고리즘은 무엇입니까?

312-50v13 문제 195

밥은 휴대전화로 이런 문자 메시지를 받았습니다. "안녕하세요, 저는 야후 은행의 스콧 스멜비입니다.
중요한 거래 관련 문의는 [email protected]으로 연락주세요. 아래 문장 중 맞는 것은 무엇인가요?