显示标签为“EX0-105”的博文。显示所有博文
显示标签为“EX0-105”的博文。显示所有博文

2013年9月19日星期四

Le meilleur matériel de formation examen EXIN EX0-105

Pass4Test est un bon catalyseur du succès pour les professionnels IT. Beaucoup de gens passer le test EXIN EX0-105 avec l'aide de l'outil formation. Les experts profitent leurs expériences riches et connaissances à faire sortir la Q&A EXIN EX0-105 plus nouvelle qui comprend les exercices de pratiquer et le test simulation. Vous pouvez passer le test EXIN EX0-105 plus facilement avec la Q&A de Pass4Test.

Les spécialistes d'expérience de Pass4Test ont fait une formation ciblée au test EXIN EX0-105. Cet outil de formation est convenable pour les candidats de test EXIN EX0-105. Pass4Test n'offre que les produits de qualité. Vous aurez une meilleure préparation à passer le test avec l'aide de Pass4Test.

Pass4Test vous promet de vous aider à passer le test EXIN EX0-105, vous pouvez télécharger maintenant les Q&As partielles de test EXIN EX0-105 en ligne. Il y a encore la mise à jour gratuite pendant un an pour vous. Si vous malheureusement rater le test, votre argent sera 100% rendu.

Dans cette société de plus en plus intense, nous vous proposons à choisir une façon de se former plus efficace : moins de temps et d'argent dépensé. Pass4Test peut vous offrir une bonne solution avec une plus grande space à développer.

Code d'Examen: EX0-105
Nom d'Examen: EXIN (Information Security Foundation based on ISO/IEC 27002 )
Questions et réponses: 80 Q&As

EX0-105 Démo gratuit à télécharger: http://www.pass4test.fr/Ex0-105.html

NO.1 What physical security measure is necessary to control access to company information?
A.Air-conditioning
B.Username and password
C.The use of break-resistant glass and doors with the right locks, frames and hinges
D.Prohibiting the use of USB sticks
Answer:C

EXIN   EX0-105   EX0-105   EX0-105 examen   EX0-105 examen

NO.2 You are the owner of the courier company SpeeDelivery. You employ a few people who, while waiting to
make a delivery, can carry out other tasks. You notice, however, that they use this time to send and read
their private mail and surf the Internet. In legal terms, in which way can the use of the Internet and e-mail
facilities be best regulated?
A.Installing an application that makes certain websites no longer accessible and that filters attachments in
e-mails
B.Drafting a code of conduct for the use of the Internet and e-mail in which the rights and obligations of
both the employer and staff are set down
C.Implementing privacy regulations
D.Installing a virus scanner
Answer:B

certification EXIN   certification EX0-105   EX0-105   EX0-105 examen

NO.3 You work for a large organization. You notice that you have access to confidential information that you
should not be able to access in your position. You report this security incident to the helpdesk. The
incident cycle isinitiated. What are the stages of the security incident cycle?
A.Threat, Damage, Incident, Recovery
B.Threat, Damage, Recovery, Incident
C.Threat, Incident, Damage, Recovery
D.Threat, Recovery, Incident, Damage
Answer:C

EXIN   EX0-105   certification EX0-105

NO.4 You work in the IT department of a medium-sized company. Confidential information has got into the
wrong hands several times. This has hurt the image of the company. You have been asked to propose
organizational security measures for laptops at your company. What is the first step that you should take?
A.Formulate a policy regarding mobile media (PDAs, laptops, smartphones, USB sticks)
B.Appoint security personnel
C.Encrypt the hard drives of laptops and USB sticks
D.Set up an access control policy
Answer:A

EXIN examen   certification EX0-105   EX0-105   EX0-105   EX0-105 examen

NO.5 Who is authorized to change the classification of a document?
A.The author of the document
B.The administrator of the document
C.The owner of the document
D.The manager of the owner of the document
Answer:C

EXIN   EX0-105   EX0-105   EX0-105

NO.6 The company Midwest Insurance has taken many measures to protect its information. It uses an
Information Security Management System, the input and output of data in applications is validated,
confidential documents are sent in encrypted form and staff use tokens to access information systems.
Which of these is not a technical measure?
A.Information Security Management System
B.The use of tokens to gain access to information systems
C.Validation of input and output data in applications
D.Encryption of information
Answer:A

EXIN   EX0-105   EX0-105

NO.7 Why is air-conditioning placed in the server room?
A.In the server room the air has to be cooled and the heat produced by the equipment has to be extracted.
The air in the room is also dehumidified and filtered.
B.When a company wishes to cool its offices, the server room is the best place. This way, no office space
needs to be sacrificed for such a large piece of equipment.
C.It is not pleasant for the maintenance staff to have to work in a server room that is too warm.
D.Backup tapes are made from thin plastic which cannot withstand high temperatures. Therefore, if it gets
too hot in a server room, they may get damaged.
Answer:A

EXIN   EX0-105 examen   EX0-105 examen

NO.8 What is an example of a physical security measure?
A.A code of conduct that requires staff to adhere to the clear desk policy, ensuring that confidential
information is not left visibly on the desk at the end of the work day
B.An access control policy with passes that have to be worn visibly
C.The encryption of confidential information
D.Special fire extinguishers with inert gas, such as Argon
Answer:D

EXIN   EX0-105   EX0-105   EX0-105

NO.9 Why do organizations have an information security policy?
A.In order to demonstrate the operation of the Plan-Do-Check-Act cycle within an organization.
B.In order to ensure that staff do not break any laws.
C.In order to give direction to how information security is set up within an organization.
D.In order to ensure that everyone knows who is responsible for carrying out the backup procedures.
Answer:C

EXIN   certification EX0-105   certification EX0-105   EX0-105   EX0-105 examen

NO.10 Your organization has an office with space for 25 workstations. These workstations are all fully
equipped and in use. Due to a reorganization 10 extra workstations are added, 5 of which are used for a
call centre 24 hours per day. Five workstations must always be available. What physical security
measures must be taken in order to ensure this?
A.Obtain an extra office and set up 10 workstations. You would therefore have spare equipment that can
be used to replace any non-functioning equipment.
B.Obtain an extra office and set up 10 workstations. Ensure that there are security personnel both in the
evenings and at night, so that staff can work there safely and securely.
C.Obtain an extra office and connect all 10 new workstations to an emergency power supply and UPS
(Uninterruptible Power Supply). Adjust the access control system to the working hours of the new staff.
Inform the building security personnel that work will also be carried out in the evenings and at night.
D.Obtain an extra office and provide a UPS (Uninterruptible Power Supply) for the five most important
workstations.
Answer:C

EXIN examen   EX0-105   certification EX0-105   certification EX0-105   EX0-105 examen

EX0-105 est un test de EXIN Certification, donc réussir EX0-105 est le premier pas à mettre le pied sur la Certifiction EXIN. Ça peut expliquer certiainement pourquoi le test EXIN EX0-105 devient de plus en plus chaud, et il y a de plus en plus de gens qui veulent participer le test EX0-105. Au contraire, il n'y a que pas beaucoup de gens qui pourrait réussir ce test. Dans ce cas, si vous vous réfléchissez étudier avec une bonne Q&A?

2013年7月24日星期三

Le dernier examen EXIN EX0-107 EX0-106 EX0-105 EX0-103 gratuit Télécharger

Pass4Test est un site particulier d'offrir la formation à propos de test Certification IT. C'est un bon choix pour vous aider à réussir le test EXIN EX0-107 EX0-106 EX0-105 EX0-103. Pass4Test offre toutes les informations et les documentations plus nouvelles qui peut vous donner plus de chances à réussir le test.


La solution offerte par Pass4Test comprenant un test simulation bien proche de test réel EXIN EX0-107 EX0-106 EX0-105 EX0-103 peut vous assurer à réussir 100% le test EXIN EX0-107 EX0-106 EX0-105 EX0-103. D'ailleur, le service de la mise à jour gratuite est aussi pour vous. Maintenant, vous pouvez télécharger le démo gratuit pour prendre un essai.


Pass4Test peut offrir la facilité aux candidats qui préparent le test EXIN EX0-107 EX0-106 EX0-105 EX0-103. Nombreux de candidats choisissent le Pass4Test à préparer le test et réussir finalement à la première fois. Les experts de Pass4Test sont expérimentés et spécialistes. Ils profitent leurs expériences riches et connaissances professionnelles à rechercher la Q&A EXIN EX0-107 EX0-106 EX0-105 EX0-103 selon le résumé de test réel EXIN EX0-107 EX0-106 EX0-105 EX0-103. Vous pouvez réussir le test à la première fois sans aucune doute.


Vous pouvez s'exercer en Internet avec le démo gratuit. Vous allez découvrir que la Q&A de Pass4Test est laquelle le plus complète. C'est ce que vous voulez.


Le test EXIN EX0-107 EX0-106 EX0-105 EX0-103 est populaire dans l'Industrie IT. Il y a beaucoup de professionnels IT veulent ce passport de IT. Votre vie et salaire sera améliorée avec ce Certificat. Vous aurez une meilleure assurance.


Code d'Examen: EX0-107

Nom d'Examen: EXIN (SCNP Strategic Infrastructure Security)

Questions et réponses: 233 Q&As

Code d'Examen: EX0-106

Nom d'Examen: EXIN (SCNS Tactical Perimeter Defense)

Questions et réponses: 232 Q&As

Code d'Examen: EX0-105

Nom d'Examen: EXIN (Information Security Foundation based on ISO/IEC 27002 )

Questions et réponses: 80 Q&As

Code d'Examen: EX0-103

Nom d'Examen: EXIN (ISO/IEC 20000 Foundation)

Questions et réponses: 116 Q&As

Vous pouvez télécharger tout d'abord une partie de Q&A Certification EXIN EX0-107 EX0-106 EX0-105 EX0-103 pour tester si Pass4Test est vraiment professionnel. Nous pouvons vous aider à réussir 100% le test EXIN EX0-107 EX0-106 EX0-105 EX0-103. Si malheureusement, vous ratez le test, votre argent sera 100% rendu.


EX0-107 Démo gratuit à télécharger: http://www.pass4test.fr/EX0-107.html


NO.1 In the past it was, at times, difficult to locate current information on security vulnerabilities. What is the
name of the security communitys effort to create a comprehensive database of multiple vulnerabilities and
security tools?
A. Common Vulnerabilities and Exploits
B. Cataloged Venerations and Exposures
C. Common Vulnerabilities and Exposures
D. Cataloged Vulnerabilities and Exposures
E. Cataloged Vulnerabilities and Exploits
Answer: C

EXIN   EX0-107 examen   EX0-107 examen   EX0-107   EX0-107

NO.2 When using the 3DES encryption ( C = EK1[DK2[EK1[P]]] ) , what is the function of C?
A. C is the text before encryption
B. C is the first encryption key
C. C is the second encryption key
D. C is the decryption key
E. C is the text after encryption
Answer: E

EXIN   EX0-107   certification EX0-107   EX0-107

NO.3 You are aware of the significance and security risk that Social Engineering plays on your company. Of
the following Scenarios, select those that, just as described, represent potentially dangerous Social
Engineering:
A. A writer from a local college newspapers calls and speaks to a network administrator. On the call the
writer requests an interview about the current trends in technology and offers to invite the administrator to
speak at a seminar.
B. An anonymous caller calls and wishes to speak with the receptionist. On the call the caller asks the
receptionist the normal business hours that the organization is open to the public.
C. An anonymous caller calls and wishes to speak with the purchaser of IT hardware and software. On the
call the caller lists several new products that the purchaser may be interested in evaluating. The caller
asks for a time to come and visit to demonstrate the new products.
D. An email, sent by the Vice President of Sales and Marketing, is received by the Help Desk asking to
reset the password of the VP of Sales and Marketing.
E. An email is received by the Chief Security Officer (CSO) about a possible upgrade coming from the ISP
to a different brand of router. The CSO is asked for the current network's configuration data and the
emailer discusses the method, plan, and expected dates for the rollover to the new equipment.
Answer: DE

EXIN   EX0-107   certification EX0-107   EX0-107 examen   EX0-107

NO.4 If you encrypt or decrypt files and folders located on a remote computer that has been enabled for
remote encryption; the data that is transmitted over the network by this process is not encrypted. In order
to keep data encrypted as it is transmitted over the network, which of the following must you do?
A. You must implement EFS.
B. You must implement B2 security for Windows.
C. You must use IPSec.
D. You must use a recovery agent.
E. You must transmit the entire folder, not individual files.
Answer: C

certification EXIN   EX0-107   EX0-107   EX0-107 examen   certification EX0-107   EX0-107 examen

NO.5 You have just become the senior security professional in your office. After you have taken a complete
inventory of the network and resources, you begin to work on planning for a successful security
implementation in the network. You are aware of the many tools provided for securing Windows 2003
machines in your network. What is the function of Secedit.exe?
A. This tool is used to set the NTFS security permissions on objects in the domain.
B. This tool is used to create an initial security database for the domain.
C. This tool is used to analyze a large number of computers in a domain-based infrastructure.
D. This tool provides an analysis of the local system NTFS security.
E. This tool provides a single point of management where security options can be applied to a local
computer or can be imported to a GPO.
Answer: C

EXIN   EX0-107   certification EX0-107

NO.6 What type of cipher is used by an algorithm that encrypts data one bit at a time?
A. 64-bit encryption Cipher
B. Block Cipher
C. Stream Cipher
D. Diffuse Cipher
E. Split Cipher
Answer: C

EXIN   EX0-107   EX0-107 examen   EX0-107

NO.7 In order for your newly written security policy to have any weight, it must be implemented. Which of
the following are the three components of a successful Security Policy Implementation in an organization?
A. Policy Monitoring
B. Policy Design
C. Policy Committee
D. Policy Enforcement
E. Policy Documentation
Answer: ABD

EXIN examen   certification EX0-107   certification EX0-107

NO.8 During the configuration of your Linux system, you are working with the available drives in the
computer. What syntax defines the First (Primary) IDE hard disk drive?
A. /dev/sda
B. /dev/fda
C. /dev/hd1
D. /dev/hda
E. /dev/fd1
Answer: D

EXIN   EX0-107 examen   EX0-107   EX0-107   certification EX0-107   certification EX0-107

NO.9 In the process of public key cryptography, which of the following is true?
A. Only the public key is used to encrypt and decrypt
B. Only the private key can encrypt and only the public key can decrypt
C. Only the public key can encrypt and only the private key can decrypt
D. The private key is used to encrypt and decrypt
E. If the public key encrypts, then only the private key can decrypt
Answer: E

certification EXIN   certification EX0-107   certification EX0-107   EX0-107 examen

NO.10 Which of the following are symmetric encryption algorithms?
A. MD5
B. RSA
C. Diffie-Hellman
D. 3DES
E. AES
Answer: DE

EXIN   EX0-107   EX0-107   EX0-107 examen

NO.11 Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use
Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of
traffic did Snort capture in this log file?
A. NetBus Scan
B. Trojan Scan
C. Ping Sweep
D. Port Scan
E. Ping Sweep
Answer: D

EXIN   EX0-107   EX0-107   EX0-107 examen

NO.12 You are discussing the design and infrastructure of the Internet with several colleagues when a
disagreement begins over the actual function of the NAP in the Internets design. What is the function of a
NAP in the physical structure of the Internet?
A. The NAP provides for a layered connection system of ISPs connecting to the backbone.
B. The NAP provides the actual connection point between a local user and the Internet.
C. The NAP provides the physical network with communication channels for the Internet and voice/data
applications.
D. The NAP provides a national interconnection of systems, called peering centers, to the NSPs.
E. The NAP provides for a connection point between an ISP and the backbone of the Internet.
Answer: E

EXIN   EX0-107   EX0-107   EX0-107 examen   EX0-107   EX0-107

NO.13 During the review of the security logs you notice some unusual traffic. It seems that a user has
connected to your Web site ten times in the last week, and each time has visited every single page on the
site. You are concerned this may be leading up to some sort of attack. What is this user most likely getting
ready to do?
A. Mirror the entire web site.
B. Download entire DNS entries.
C. Scan all ports on a web server.
D. Perform a Distributed Denial of Service attack through the Web server.
E. Allow users to log on to the Internet without an ISP.
Answer: A

EXIN examen   EX0-107   EX0-107   EX0-107 examen

NO.14 During a one week investigation into the security of your network you work on identifying the
information that is leaked to the Internet, either directly or indirectly. One thing you decide to evaluate is
the information stored in the Whois lookup of your organizational website. Of the following, what pieces of
information can be identified via this method?
A. Registrar
B. Mailing Address
C. Contact Name
D. Record Update
E. Network Addresses (Private)
Answer: ABCD

certification EXIN   EX0-107   EX0-107   EX0-107 examen   EX0-107

NO.15 Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use
Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of
traffic did Snort capture in this log file?
A. Windows 2000 Ping Request
B. Windows NT 4.0 Ping Request
C. Linux Ping Request
D. Linux Ping Response
E. Windows NT 4.0 Ping Response
Answer: B

certification EXIN   EX0-107   certification EX0-107   EX0-107 examen   certification EX0-107

NO.16 You are working on the authentication systems in your network, and are concerned with your legacy
systems. In Windows NT 4.0, before Service Pack 4 (SP4), there were only two supported methods of
authentication. What were those two methods?
A. NetBIOS
B. LM
C. NTLM
D. NTLMv2
E. Kerberos
Answer: BC

EXIN   certification EX0-107   EX0-107   EX0-107 examen   EX0-107

NO.17 To maintain the security of your network you routinely run several checks of the network and
computers. Often you use the built-in tools, such as netstat. If you run the following command: netstat -e
which of the following will be the result?
A. Displays all connections and listening ports
B. Displays Ethernet statistics
C. Displays addresses and port numbers in numerical form
D. Shows connections for the protocol specified
E. Displays per-protocol statistics
Answer: B

certification EXIN   EX0-107   EX0-107 examen

NO.18 As per the guidelines in the ISO Security Policy standard, what is the purpose of the section on
Business Continuity Planning?
A. The objectives of this section are to maintain appropriate protection of corporate assets and to ensure
that information assets receive an appropriate level of protection.
B. The objectives of this section are to provide management direction and support for information security.
C. The objectives of this section are to counteract interruptions to business activities and to critical
business processes from the effects of major failures or disasters.
D. The objectives of this section are to avoid breaches of any criminal or civil law, statutory, regulatory or
contractual obligations and of any security requirements, and to ensure compliance of systems with
organizational security policies and standards.
E. The objectives of this section are to control access to information, to prevent unauthorized access to
information systems, to ensure the protection of networked services, and to prevent unauthorized
computer access.
Answer: C

EXIN examen   certification EX0-107   certification EX0-107   EX0-107

NO.19 You are configuring the lines that control access to exported objects on your server running NFS. If
you have a directory called /Tech and you wish to export this directory to network 192.168.20.0/24,
allowing root access, and the permissions of read and write, which of the following lines will accomplish
this?
A. (RW) no_root_squash /Tech 192.168.20.0/24
B. /Tech 192.168.20.0/24 (rw) no_root_squash
C. (RW) no_root_squash 192.168.20.0/24 /Tech
D. (RW)no_root_squash:/Tech 192.168.20.0/24
E. /Tech 192.168.20.0/24(rw) no_root_squash
Answer: E

EXIN examen   EX0-107   EX0-107 examen

NO.20 You have become the lead security professional for a mid-sized organization. You are currently
studying DNS issues, and configuration options. You come across the concepts of DNS Spoofing, and
investigate more. What is DNS Spoofing?
A. DNS Spoofing is when the DNS client submits a false DNS request to the DNS server, and the DNS
server responds with correct data.
B. DNS Spoofing is the DNS client submits a DNS request to the DNS server using a bogus IP address,
and the DNS server responds to the incorrect host.
C. DNS Spoofing is when a DNS Server responds to an unauthorized DNS client, providing that client with
name resolution.
D. DNS Spoofing is when a DNS client is forced to make a DNS query to an imposter DNS server, which
send the client to an imposter resource.
E. DNS spoofing is when a DNS server provides name resolution to clients that are located in a different
IP subnet than the server itself.
Answer: D

EXIN examen   EX0-107   certification EX0-107

NO.21 Often times attackers will run scans against the network to identify different network and operating
systems, and resources that are available. If an attacker runs scans on the network, and you are logging
the connections, which of the following represent the legitimate combination of packets that will be sent
between the attacker and target?
A. Attacker PSH-FIN Scan, Target RST-FIN Response
B. Attacker ACK Scan, Target NULL Response
C. Attacker NULL Scan, Target RST Response
D. Attacker SYN Scan, Target NULL Response
E. Attacker FIN Scan, Target RST Response
Answer: CE

EXIN   EX0-107   EX0-107   EX0-107   EX0-107   EX0-107 examen

NO.22 What is the name of the informational page that is relevant to a particular command in Linux?
A. Readme Page
B. Lnx_nfo Page
C. Man Page
D. X_Win Page
E. Cmd_Doc Page
Answer: C

EXIN   EX0-107 examen   EX0-107 examen

NO.23 As per the guidelines in the ISO Security Policy standard, what is the purpose of the section on
Physical and Environmental Security?
A. The objectives of this section are to avoid breaches of any criminal or civil law, statutory, regulatory or
contractual obligations and of any security requirements, and to ensure compliance of systems with
organizational security policies and standards.
B. The objectives of this section are to prevent unauthorized access, damage and interference to
business premises and information; to prevent loss, damage or compromise of assets and interruption to
business activities; to prevent compromise or theft of information and information processing facilities.
C. The objectives of this section are to provide management direction and support for information
security.
D. The objectives of this section are to maintain appropriate protection of corporate assets and to ensure
that information assets receive an appropriate level of protection.
E. The objectives of this section are to control access to information, to prevent unauthorized access to
information systems, to ensure the protection of networked services, and to prevent unauthorized
computer access.
Answer: B

EXIN   EX0-107   EX0-107   certification EX0-107   EX0-107 examen

NO.24 You have just downloaded a new file, called scnpfile.tar.gz. You are going to verify the file prior to
un-archiving the file. Which command do you need to type to un-compress the file, prior to un-archiving?
A. tar xvf scnpfile.tar.gz
B. tar -zxvf scnpfile.tar.gz
C. gunzip scnpfile.tar.gz
D. gunzip -xvf scnpfile.tar.gz
E. gunzip -zxvf scnpfile.tar.gz
Answer: C

EXIN   EX0-107 examen   certification EX0-107   EX0-107   certification EX0-107

NO.25 To increase the security of your network and systems, it has been decided that EFS will be
implemented in the appropriate situations. Two users are working on a common file, and often email this
file back and forth between each other. Is this a situation where the use of EFS will create effective
security, and why (or why not)?
A. No, the security will remain the same since both users will share the same key for encryption.
B. Yes, since the file will be using two keys for encryption the security will increase.
C. No, the security will remain the same since both users will share the same key for decryption.
D. Yes, since the file will be using two keys for decryption the security will increase.
E. No, EFS cannot be used for files that are shared between users.
Answer: E

EXIN   certification EX0-107   EX0-107   EX0-107

NO.26 On Monday, during a routine check of a users Windows workstation, you find the following program,
called regedit.bat on the users local hard drive:
Net localgroup administrators local /all
Start regedit.exe
Exit
What is this program capable of doing on this computer?
A. Nothing, the first line is coded wrong.
B. It will add the administrators to the local group
C. It will add the local user to all local groups
D. It will add the administrators to all local groups
E. It will add the local user to the administrators group
Answer: E

EXIN   certification EX0-107   EX0-107 examen   certification EX0-107   EX0-107

NO.27 What is a problem with symmetric key cryptography?
A. It is slower than asymmetric key cryptography
B. Secure distribution of the public key
C. There is a lack of encryption protocols that can use symmetric key cryptography
D. Secure distribution of a secret key
E. Symmetric key cryptography is reserved for the NSA
Answer: D

EXIN   EX0-107   EX0-107 examen

NO.28 Attackers have the ability to use programs that are able to reveal local passwords by placing some
kind of a pointer/cursor over the asterisks in a program's password field. The reason that such tools can
uncover passwords in some Operating Systems is because:
A. the passwords are simply masked with asterisks
B. the etc/passwd file is on a FAT32 partition
C. the passwords are decrypted on screen
D. the password text is stored in ASCII format
E. the etc/passwd file is on a FAT16 partition
Answer: A

EXIN   EX0-107   certification EX0-107

NO.29 You are configuring the permissions to a file, called file1, on your Linux file server. You wish to change
the permissions to remove the execute permission from the others and group. Which of the following
commands will complete this task?
A. umask x-og file1
B. umask og-x file1
C. chmod xog- file1
D. chmod x-og file1
E. chmod og-x file1
Answer: E

certification EXIN   EX0-107   certification EX0-107   EX0-107 examen   EX0-107 examen

NO.30 Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use
Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of
traffic did Snort capture in this log file?
A. Windows 2000 Ping Request
B. Windows NT 4.0 Ping Request
C. Linux Ping Request
D. Linux Ping Response
E. Windows NT 4.0 Ping Response
Answer: B

certification EXIN   EX0-107   EX0-107   EX0-107 examen

2013年7月2日星期二

Meilleur EXIN EX0-105 test formation guide

Bien qu'Il y ait plein de talentueux dans cette société, il manque beaucoup de professionnels dans les domaine en cours de développement, l'Industrie IT est l'un de ces domaines. Donc le test EXIN EX0-105 est un bon l'examination de technique informatique. Pass4Test est un site d'offrir la formation particulière au test EXIN EX0-105.


Obtenez la Q&A de test EXIN EX0-105 de Pass4Test plus tôt, vous pouvez réussir le test Certification EXIN EX0-105 plus tôt.


Le guide d'étude sorti de Pass4Test comprend les expériences résumées par nos experts, les matériaux et les Q&As à propos de test Certification EXIN EX0-105. Notre bonne réputation dans l'industrie IT sera une assurance 100% à réussir le test EXIN EX0-105. Afin de vous permettre de choisir Pass4Test, vous pouvez télécharger gratuitement le démo de Q&A tout d'abord.


Dans ce monde d'informatique, l'industrie IT est suivi par de plus en plus de ges. Dans ce domaine demandant beaucoup de techniques, il faut des Certificat à se preuver les techniques professionnelle. Les Certificats IT sont improtant pour un interviewé pendant un entretien. C'est pas facile à passer le test EXIN EX0-105, donc c'est pourquoi beaucoup de professionnels qui choisissent ce Certificat pour se preuver.


Code d'Examen: EX0-105

Nom d'Examen: EXIN (Information Security Foundation based on ISO/IEC 27002 )

Questions et réponses: 80 Q&As

Aujoud'hui, dans cette indutrie IT de plus en plus concurrentiel, le Certificat de EXIN EX0-105 peut bien prouver que vous avez une bonne concurrence et une space professionnelle plus grande à atteindre. Dans le site Pass4Test, vous pouvez trouver un outil de se former très pratique. Nos IT experts vous offrent les Q&As précises et détaillées pour faciliter votre cours de préparer le test EXIN EX0-105 qui vous amenera le succès du test EXIN EX0-105, au lieu de traivailler avec peine et sans résultat.


Le Pass4Past possède une équipe d'élite qui peut vous offrir à temps les matériaux de test Certification EXIN EX0-105. En même temps, nos experts font l'accent à mettre rapidement à jour les Questions de test Certification IT. L'important est que Pass4Test a une très bonne réputation dans l'industrie IT. Bien que l'on n'ait pas beaucoup de chances à réussir le test de EX0-105, Pass4Test vous assure à passer ce test par une fois grâce à nos documentations avec une bonne précision et une grande couverture.


Vous n'avez besoin que de faire les exercices à propos du test EXIN EX0-105 offertes par Pass4Test, vous pouvez réussir le test sans aucune doute. Et ensuite, vous aurez plus de chances de promouvoir avec le Certificat. Si vous ajoutez le produit au panier, nous vous offrirons le service 24h en ligne.


EX0-105 Démo gratuit à télécharger: http://www.pass4test.fr/Ex0-105.html


NO.1 Who is authorized to change the classification of a document?
A.The author of the document
B.The administrator of the document
C.The owner of the document
D.The manager of the owner of the document
Answer:C

EXIN examen   certification EX0-105   EX0-105 examen   EX0-105   certification EX0-105

NO.2 What physical security measure is necessary to control access to company information?
A.Air-conditioning
B.Username and password
C.The use of break-resistant glass and doors with the right locks, frames and hinges
D.Prohibiting the use of USB sticks
Answer:C

EXIN examen   EX0-105   certification EX0-105   EX0-105

NO.3 You are the owner of the courier company SpeeDelivery. You employ a few people who, while waiting to
make a delivery, can carry out other tasks. You notice, however, that they use this time to send and read
their private mail and surf the Internet. In legal terms, in which way can the use of the Internet and e-mail
facilities be best regulated?
A.Installing an application that makes certain websites no longer accessible and that filters attachments in
e-mails
B.Drafting a code of conduct for the use of the Internet and e-mail in which the rights and obligations of
both the employer and staff are set down
C.Implementing privacy regulations
D.Installing a virus scanner
Answer:B

EXIN   EX0-105   EX0-105

NO.4 You work for a large organization. You notice that you have access to confidential information that you
should not be able to access in your position. You report this security incident to the helpdesk. The
incident cycle isinitiated. What are the stages of the security incident cycle?
A.Threat, Damage, Incident, Recovery
B.Threat, Damage, Recovery, Incident
C.Threat, Incident, Damage, Recovery
D.Threat, Recovery, Incident, Damage
Answer:C

certification EXIN   EX0-105 examen   EX0-105   certification EX0-105

NO.5 Why is air-conditioning placed in the server room?
A.In the server room the air has to be cooled and the heat produced by the equipment has to be extracted.
The air in the room is also dehumidified and filtered.
B.When a company wishes to cool its offices, the server room is the best place. This way, no office space
needs to be sacrificed for such a large piece of equipment.
C.It is not pleasant for the maintenance staff to have to work in a server room that is too warm.
D.Backup tapes are made from thin plastic which cannot withstand high temperatures. Therefore, if it gets
too hot in a server room, they may get damaged.
Answer:A

certification EXIN   certification EX0-105   EX0-105   EX0-105 examen

NO.6 Your organization has an office with space for 25 workstations. These workstations are all fully
equipped and in use. Due to a reorganization 10 extra workstations are added, 5 of which are used for a
call centre 24 hours per day. Five workstations must always be available. What physical security
measures must be taken in order to ensure this?
A.Obtain an extra office and set up 10 workstations. You would therefore have spare equipment that can
be used to replace any non-functioning equipment.
B.Obtain an extra office and set up 10 workstations. Ensure that there are security personnel both in the
evenings and at night, so that staff can work there safely and securely.
C.Obtain an extra office and connect all 10 new workstations to an emergency power supply and UPS
(Uninterruptible Power Supply). Adjust the access control system to the working hours of the new staff.
Inform the building security personnel that work will also be carried out in the evenings and at night.
D.Obtain an extra office and provide a UPS (Uninterruptible Power Supply) for the five most important
workstations.
Answer:C

EXIN   EX0-105   EX0-105   EX0-105

NO.7 Why do organizations have an information security policy?
A.In order to demonstrate the operation of the Plan-Do-Check-Act cycle within an organization.
B.In order to ensure that staff do not break any laws.
C.In order to give direction to how information security is set up within an organization.
D.In order to ensure that everyone knows who is responsible for carrying out the backup procedures.
Answer:C

certification EXIN   EX0-105   EX0-105   EX0-105

NO.8 You work in the IT department of a medium-sized company. Confidential information has got into the
wrong hands several times. This has hurt the image of the company. You have been asked to propose
organizational security measures for laptops at your company. What is the first step that you should take?
A.Formulate a policy regarding mobile media (PDAs, laptops, smartphones, USB sticks)
B.Appoint security personnel
C.Encrypt the hard drives of laptops and USB sticks
D.Set up an access control policy
Answer:A

certification EXIN   EX0-105   EX0-105   EX0-105

NO.9 What is an example of a physical security measure?
A.A code of conduct that requires staff to adhere to the clear desk policy, ensuring that confidential
information is not left visibly on the desk at the end of the work day
B.An access control policy with passes that have to be worn visibly
C.The encryption of confidential information
D.Special fire extinguishers with inert gas, such as Argon
Answer:D

EXIN examen   certification EX0-105   EX0-105   EX0-105   certification EX0-105

NO.10 The company Midwest Insurance has taken many measures to protect its information. It uses an
Information Security Management System, the input and output of data in applications is validated,
confidential documents are sent in encrypted form and staff use tokens to access information systems.
Which of these is not a technical measure?
A.Information Security Management System
B.The use of tokens to gain access to information systems
C.Validation of input and output data in applications
D.Encryption of information
Answer:A

EXIN examen   certification EX0-105   certification EX0-105   EX0-105   EX0-105

Le Certificat de EXIN EX0-105 peut vous aider à monter un autre degré de votre carrière, même que votre niveau de vie sera amélioré. Avoir un Certificat EXIN EX0-105, c'est-à-dire avoir une grande fortune. Le Certificat EXIN EX0-105 peut bien tester des connaissances professionnelles IT. La Q&A EXIN EX0-105 plus nouvelle vient de sortir qui peut vous aider à faciilter le cours de test préparation. Notre Q&A comprend les meilleurs exercices, test simulation et les réponses.