Home αȸ ô±
  • 협회소개

  • Home
  • ȳ
   2006 CISA Review Questions, Answers & Explanations Manual(625)    2013.11.23  HIT:19690
ȳϼ, 繫Դϴ.

 

2006 CISA Review Questions, Answers & Explanations Manual(625)

C4-69 B D մϴ.

 

ȥ ˼մϴ.


մϴ.

 

 

C4-69    ̿ϴ Ʈũ ̷ Ȯ꿡 ȿ ó ΰ?

        A. ޾ü (security fix) ġѴ.

        B. 輱(perimeter) ȭ Ʈ Ѵ.

        C. Ʈũ ׸Ʈ Ʈ Ѵ.

        D. ġ 񽺸 Ѵ.




D     񽺸 ϰ ġϴ ̷ Ȯ ϴ ̴. 񽺰 ʴ´ٸ, ȿ ϰ ̷ ȮDZ ġ ȿ ƴϴ. 輱 ϴ ̷ Ʈũ ȮǴ Ű Ѵ. ̷ Ȯ ӵ ߸ ׸Ʈ ̸ ϴ Ʈ Ѵ.

 

 





C4-69 Which of the following is the MOST effective method for dealing with the spreading of a network worm that

exploits a vulnerability in a protocol?



A. Install the vendors security fix for the vulnerability.

B. Block the protocol traffic in the perimeter firewall.

C. Block the protocol traffic between internal network segments.

D. Stop the service until an appropriate security fix is installed.



D      Stopping the service and installing the security fix is the safest way to prevent the worm from spreading.

If the service is not stopped, installing the fix is not the most effective method because the worm continues

spreading until the fix becomes effective. Blocking the protocol on the perimeter does not stop the worm from

spreading to the internal network(s). Blocking the protocol helps to slow down the spreading but also prohibits

every software that utilizes it from working between segments


2007 ý۰ ȳ
()ѱý۰ȸ (2ȣ)