問題一覧
1
- Exact data match
2
- Statistical matching
3
- Classification
4
- Document matching
5
- Password spraying
6
- Session hijacking
7
- Credential stuffing
8
- Impersonation
9
- Planning (or Requirements Planning), - Requirements and Analysis, - Design, - Development (or Coding/Implementation), - Testing, - Deployment, - Maintenance (or Operations and Monitoring)
10
- Security Onion
11
- Kali Linux
12
- Metasploit
13
- Wireshark
14
- secpol.msc
15
- services.msc
16
- wmic ( Windows Management Instrumentation )
17
- sc.exe
18
- Non-disclosure agreement (NDA)
19
- service level agreement (SLA)
20
- data sharing and use agreement (DSUA)
21
- interconnection security agreement (ISA)
22
- Regular, - Supplemented, - Extended, - Not Recoverable
23
- DomainKeys Identified Mail (DKIM)
24
- Sender Policy Framework (SPF)
25
- Simple Mail Transfer Protocol (SMTP)
26
- Domain-Based Message Authentication, Reporting, and Conformance (DMARC)
27
Is a foundational model in information security that represents three core principles essential for protecting information and systems.
28
- Confidentiality, - Integrity, - Availability
29
- Potential Reverse Shell
30
- XSS Attack
31
- SQL Injection
32
- Directory Traversal
33
- Metasploit
34
- Autopsy
35
- Nmap
36
- Nessus
37
- Brute force
38
- Password spraying
39
- Credential stuffing
40
- Impersonation
41
- MITRE ATT&CK
42
- Diamond Model of Intrusion Analysis
43
- Cyber Kill Chain
44
- The linear progression of a cyber attack
45
- MITRE ATT&CK framework
46
- OpenIOC
47
- Diamond Model of Intrusion Analysis
48
- Lockheed Martin cyber kill chain
49
- Cyber Kill Chain
50
- Diamond Model of Intrusion Analysis
51
- OWASP Testing Guide
52
- MITRE ATT&CK
53
- Developed
54
- Acquired and augmented
55
- Integrated
56
- Advanced
57
- CPU cache, - RAM, - Swap, - Hard drive
58
- Nmap
59
- Wireshark
60
- ping
61
- netstat
62
- Cross-site scripting
63
- Cross-site request forgery
64
- Command injection
65
- SQL injection
66
- Data minimization
67
- Anonymization
68
- Tokenization
69
- Data masking
70
- Chained exploit
71
- Denial of Service exploit
72
- SQL injection exploit
73
- Buffer overflow exploit
74
- Lateral Movement
75
- Exfiltration
76
- Credential Access
77
- Initial Access
78
- Level 0, - Emergency, - Level 1, - Alert, - Level 2, - Critical, - Level 3, - Errors, - Level 4, - Warnings, - Level 5, - Notifications, - Level 6, - Information, - Level 7, - Debugging
79
- Zone transfers
80
- FQDN resolution
81
- DNS poisoning
82
- Split horizon
83
- plists
84
- .config files
85
- The registry
86
- .profile files
87
- Heartbleed
88
- Carbanak
89
- BlueSmack
90
- ROBOT Attack
examen Alexandru
examen Alexandru
ユーザ名非公開 · 40問 · 7日前examen Alexandru
examen Alexandru
40問 • 7日前History and Discovery of Microorganisms
History and Discovery of Microorganisms
HERSHEY VALERIE BERNARDINO · 80問 · 4ヶ月前History and Discovery of Microorganisms
History and Discovery of Microorganisms
80問 • 4ヶ月前L.O. | The Threat Intelligence Cycle
L.O. | The Threat Intelligence Cycle
The R.S.S.H Delivery Company · 40問 · 4ヶ月前L.O. | The Threat Intelligence Cycle
L.O. | The Threat Intelligence Cycle
40問 • 4ヶ月前4.1
4.1
Sab Sescon · 34問 · 4ヶ月前4.1
4.1
34問 • 4ヶ月前HPC 102 FINALS
HPC 102 FINALS
Leah Jean Better · 27問 · 1年前HPC 102 FINALS
HPC 102 FINALS
27問 • 1年前Finals elective
Finals elective
Dasay Montes · 54問 · 1年前Finals elective
Finals elective
54問 • 1年前research strategies
research strategies
kiler · 22問 · 1年前research strategies
research strategies
22問 • 1年前chapter 18
chapter 18
ユーザ名非公開 · 44問 · 1年前chapter 18
chapter 18
44問 • 1年前awards and honours 2
awards and honours 2
Pratyasha Acharya · 37問 · 1年前awards and honours 2
awards and honours 2
37問 • 1年前Enu2
Enu2
Sabrina Mikhaela Canindo · 23問 · 1年前Enu2
Enu2
23問 • 1年前quiz éléments
quiz éléments
ユーザ名非公開 · 53問 · 1年前quiz éléments
quiz éléments
53問 • 1年前test 1
test 1
Leslie Munoz Diaz · 86問 · 1年前test 1
test 1
86問 • 1年前BIO - part 1
BIO - part 1
Claire Sadaya · 100問 · 1年前BIO - part 1
BIO - part 1
100問 • 1年前chn quiz 1
chn quiz 1
Lawrence Nathan Corsiga · 29問 · 1年前chn quiz 1
chn quiz 1
29問 • 1年前MAJORSHIP 2
MAJORSHIP 2
Madelyn Carillo · 100問 · 1年前MAJORSHIP 2
MAJORSHIP 2
100問 • 1年前AP
AP
Lynzey Bataller · 70問 · 1年前AP
AP
70問 • 1年前CropProt 01
CropProt 01
Anne Ranay · 100問 · 1年前CropProt 01
CropProt 01
100問 • 1年前index 2024
index 2024
Pratyasha Acharya · 93問 · 1年前index 2024
index 2024
93問 • 1年前БИОХИМИЯ
БИОХИМИЯ
Anna Giorgadze · 72問 · 1年前БИОХИМИЯ
БИОХИМИЯ
72問 • 1年前lesson 3
lesson 3
ユーザ名非公開 · 70問 · 1年前lesson 3
lesson 3
70問 • 1年前問題一覧
1
- Exact data match
2
- Statistical matching
3
- Classification
4
- Document matching
5
- Password spraying
6
- Session hijacking
7
- Credential stuffing
8
- Impersonation
9
- Planning (or Requirements Planning), - Requirements and Analysis, - Design, - Development (or Coding/Implementation), - Testing, - Deployment, - Maintenance (or Operations and Monitoring)
10
- Security Onion
11
- Kali Linux
12
- Metasploit
13
- Wireshark
14
- secpol.msc
15
- services.msc
16
- wmic ( Windows Management Instrumentation )
17
- sc.exe
18
- Non-disclosure agreement (NDA)
19
- service level agreement (SLA)
20
- data sharing and use agreement (DSUA)
21
- interconnection security agreement (ISA)
22
- Regular, - Supplemented, - Extended, - Not Recoverable
23
- DomainKeys Identified Mail (DKIM)
24
- Sender Policy Framework (SPF)
25
- Simple Mail Transfer Protocol (SMTP)
26
- Domain-Based Message Authentication, Reporting, and Conformance (DMARC)
27
Is a foundational model in information security that represents three core principles essential for protecting information and systems.
28
- Confidentiality, - Integrity, - Availability
29
- Potential Reverse Shell
30
- XSS Attack
31
- SQL Injection
32
- Directory Traversal
33
- Metasploit
34
- Autopsy
35
- Nmap
36
- Nessus
37
- Brute force
38
- Password spraying
39
- Credential stuffing
40
- Impersonation
41
- MITRE ATT&CK
42
- Diamond Model of Intrusion Analysis
43
- Cyber Kill Chain
44
- The linear progression of a cyber attack
45
- MITRE ATT&CK framework
46
- OpenIOC
47
- Diamond Model of Intrusion Analysis
48
- Lockheed Martin cyber kill chain
49
- Cyber Kill Chain
50
- Diamond Model of Intrusion Analysis
51
- OWASP Testing Guide
52
- MITRE ATT&CK
53
- Developed
54
- Acquired and augmented
55
- Integrated
56
- Advanced
57
- CPU cache, - RAM, - Swap, - Hard drive
58
- Nmap
59
- Wireshark
60
- ping
61
- netstat
62
- Cross-site scripting
63
- Cross-site request forgery
64
- Command injection
65
- SQL injection
66
- Data minimization
67
- Anonymization
68
- Tokenization
69
- Data masking
70
- Chained exploit
71
- Denial of Service exploit
72
- SQL injection exploit
73
- Buffer overflow exploit
74
- Lateral Movement
75
- Exfiltration
76
- Credential Access
77
- Initial Access
78
- Level 0, - Emergency, - Level 1, - Alert, - Level 2, - Critical, - Level 3, - Errors, - Level 4, - Warnings, - Level 5, - Notifications, - Level 6, - Information, - Level 7, - Debugging
79
- Zone transfers
80
- FQDN resolution
81
- DNS poisoning
82
- Split horizon
83
- plists
84
- .config files
85
- The registry
86
- .profile files
87
- Heartbleed
88
- Carbanak
89
- BlueSmack
90
- ROBOT Attack