Symantec ST0-192 (Symantec Technical Foundations:Security Solutions 2.0 Technical Assessment) 인증시험은 난이도가 높아 패스하기 어렵습니다. Symantec ST0-192 (Symantec Technical Foundations:Security Solutions 2.0 Technical Assessment) 시험은 IT업계에서도 권위가 있고 직위가 있으신 분들이 응시할 수 있는 시험이라고 알려져 있습니다. 우리 Pass4Test에서는 Symantec ST0-192 (Symantec Technical Foundations:Security Solutions 2.0 Technical Assessment) 관련 학습가이드를 제공합니다. Pass4Test 는 우리만의 IT전문가들이 만들어낸 Symantec ST0-192 (Symantec Technical Foundations:Security Solutions 2.0 Technical Assessment) 관련 최신, 최고의 자료와 학습가이드를 준비하고 있습니다. 여러분의 Symantec ST0-192 (Symantec Technical Foundations:Security Solutions 2.0 Technic al Assessment) 시험에 응시하는데 많은 도움이 될 것입니다.Pass4Test를 선택하였다면 여러분은 반은 성공한 것입니다. 여러분은 아주 빠르게 안전하게 또 쉽게 Symantec ST0-192 (Symantec Technical Foundations:Security Solutions 2.0 Technical Assessment) 인증시험 자격증을 취득하실 수 있습니다. 우리 Pass4Test에서 제공되는 모든 덤프들은 모두 100%합격율을 자랑하며 제일 퍼펙트한 서비스를 제공해드립니다.여러분은 Symantec ST0-192 (Symantec Technical Foundations:Security Solutions 2.0 Technical Assessment) 인증시험을 패스함으로 IT업계관련 직종에 종사하려는 분들에게는 아주 큰 가산점이 될수 있으며, 성공한 IT업계전문가와 한걸음 가까워 집니다.
NO.1 What are the three types of scans used to identify systems?
A. port, network, and vulnerability
B. protocol, hardware, and services
C. port, network, and protocol
D. hardware, network, and vulnerability
Answer: A
NO.2 An employee has become disgruntled with their employer, a payroll software manufacturer,
and one of
the employee's friends works for a competitor.
The employee copies some highly-confidential source code to a USB drive and gives the USB drive to
their friend after work.
Which source(s) of a breach are involved in this scenario?
A. malicious insider only
B. organized criminal only
C. malicious insider and organized criminal
D. well-meaning insider and malicious insider
Answer: A
NO.3 A cybercriminal wants to maintain future access to a compromised system.
Which tool would the cybercriminal use to accomplish this?
A. rootkit
B. keylogger
C. backdoor
D. trojan
Answer: C
NO.4 Which method does the MetaFisher bot use to extract data from a system?
A. HTTP
B. FTP
C. peer to peer
D. IRC
Answer: B
NO.5 Which global trade is determined by the United States Federal Bureau of Investigation (FBI) to
be
smaller than the global market for illegally-obtained information, according to the Security Solutions
2.0
course.?
A. illegal drug trade
B. arms trafficking trade
C. human trafficking trade
D. money laundering trade
Answer: A
NO.6 The security team of a major government agency discovers a breach involving employee data
that has
been leaked outside the agency. They discover that a software developer for the agency transferred
employee data from a secure primary system to a secondary system, for the purpose of software
development and testing. This secondary system was the target of a hacker.
Which type of breach source(s) is this?
A. cybercriminal only
B. malicious insider and cybercriminal
C. cybercriminal and well-meaning insider
D. well-meaning insider only
Answer: C
NO.7 Which group is the number one source of IT security attacks according to the Symantec
research
shared in the Security Solutions 2.0 course?
A. malicious outsiders
B. organized criminals
C. well-meaning insiders
D. malicious insiders
Answer: B
NO.8 Why would a cybercriminal avoid using a trojan in a widespread attack?
A. trojans are easily caught by antivirus products
B. end-users are aware of clicking on non-trusted executables
C. trojans only infect one system at a time
D. execution of trojans are dependent on the operating system
Answer: C
Symantec ST0-192 학습가이드
Posted 2012/12/12 7:15:33 | Category: 미분류 | Tag: