ȳϼ, 繫Դϴ.
2006 CISA Review Questions, Answers & Explanations Manual(625)
C4-69 B D մϴ.
ȥ ˼մϴ.
C4-69 ̿ϴ Ʈũ ̷ Ȯ꿡 ȿ ó ΰ?
A. ü (security fix) ġѴ.
B. 輱(perimeter) ȭ Ʈ Ѵ.
C. Ʈũ Ʈ Ʈ Ѵ.
D. ġ Ѵ.
D ϰ ġϴ ̷ Ȯ ϴ ̴. ʴ´ٸ, ȿ ϰ ̷ ȮDZ ġ ȿ ƴϴ. 輱 ϴ ̷ Ʈũ ȮǴ Ű Ѵ. ̷ Ȯ ӵ ߸ Ʈ ̸ ϴ Ʈ Ѵ.
C4-69 Which of the following is the MOST effective method for dealing with the spreading of a network worm that
exploits a vulnerability in a protocol?
A. Install the vendors security fix for the vulnerability.
B. Block the protocol traffic in the perimeter firewall.
C. Block the protocol traffic between internal network segments.
D. Stop the service until an appropriate security fix is installed.
D Stopping the service and installing the security fix is the safest way to prevent the worm from spreading.
If the service is not stopped, installing the fix is not the most effective method because the worm continues
spreading until the fix becomes effective. Blocking the protocol on the perimeter does not stop the worm from
spreading to the internal network(s). Blocking the protocol helps to slow down the spreading but also prohibits
every software that utilizes it from working between segments
|