問題一覧
1
- Mandatory vacations
2
- Separation of duties
3
- Dual control
4
- Least privilege
5
- FISMA
6
- COPPA
7
- SOX
8
- HIPPA
9
- White team
10
- Purple team
11
- Blue team
12
- Red team
13
- Diamond Model of Intrusion Analysis
14
- Cyber Kill Chain
15
- OWASP Testing Guide
16
- MITRE ATT&CK
17
- dd
18
- touch
19
- rm
20
- wget
21
- Attack surface
22
- Threat model
23
- Attack vector
24
- Adversary capability set
25
- ScoutSuite
26
- Prowler
27
- OpenVAS
28
- Pacu
29
- Diamond Model of Intrusion Analysis
30
- Open I.O.C.
31
- MITRE ATT&CK framework
32
- Lockheed Martin cyber kill chain
33
- Output encoding
34
- Error handling
35
- Input validation
36
- Session management
37
- Service provider ( S.P. )
38
- Relying party ( R.P. )
39
- Identity provider (IdP)
40
- Single sign-on (SSO)
41
- ESTABLISHED
42
- CLOSE_WAIT
43
- LAST_ACK
44
- LISTENING
45
- Behavior
46
- Heuristic
47
- Anomaly
48
- Trend
49
- Procedures
50
- Policies
51
- Guidelines
52
- Framework
53
- Full packet capture
54
- Net flow capture
55
- Software design documentation review
56
- SIEM event log monitoring
57
- CPU registers and cache memory (L1/L2/L3/GPU), - The contents of system memory (RAM), including a routing table, ARP cache, process tables, kernel statistics, and temporary file systems/swap space/virtual memory., - Collection of data storage devices like hard drives, SSDs, and flash memory devices., - Backup tapes, external media devices (hard drives, DVDs, etc.), and even configuration data or network diagrams
58
- Cross-Site Scripting (XSS)
59
- Spectre Attack
60
- Poodle Attack
61
- SolarWinds SUNBURST Attack
62
- Injection Attacks
63
- Ghostcat
64
- F5 BIG-IP Traffic Management User Interface (TMUI) Remote Code Execution Vulnerability
65
- Shattered Attack
66
- Diamond Model of Intrusion Analysis
67
- MITRE ATT&CK
68
- OSS TMM
69
- Cyber Kill Chain
70
- Capability
71
- Adversary
72
- Infrastructure
73
- Victim
74
- Adversary
75
- Infrastructure
76
- Victim
77
- Capability
78
- Forensic analysis
79
- Root cause analysis
80
- Incident response plan
81
- Lessons learned
82
- MS17-010
83
- MS16-120
84
- MS17-011
85
- MS16-098
86
- tcpdump
87
- Ping
88
- Wireshark
89
- Nmap
(Finals) Application Development Mocktest BSIT 505
(Finals) Application Development Mocktest BSIT 505
Xai Alexandrei Delos Reyes · 62問 · 1ヶ月前(Finals) Application Development Mocktest BSIT 505
(Finals) Application Development Mocktest BSIT 505
62問 • 1ヶ月前A320 GEN FAM
A320 GEN FAM
ユーザ名非公開 · 100問 · 2ヶ月前A320 GEN FAM
A320 GEN FAM
100問 • 2ヶ月前M11c18⚡️
M11c18⚡️
مقطع من الاغاني عراقيه قصيره · 20問 · 2ヶ月前M11c18⚡️
M11c18⚡️
20問 • 2ヶ月前M11c16
M11c16
مقطع من الاغاني عراقيه قصيره · 9問 · 2ヶ月前M11c16
M11c16
9問 • 2ヶ月前Process Control and Analysis
Process Control and Analysis
ユーザ名非公開 · 24問 · 3ヶ月前Process Control and Analysis
Process Control and Analysis
24問 • 3ヶ月前EALIC
EALIC
Lorenzo Cokee · 22問 · 3ヶ月前EALIC
EALIC
22問 • 3ヶ月前6 ) System Processes
6 ) System Processes
The R.S.S.H Delivery Company · 8問 · 3ヶ月前6 ) System Processes
6 ) System Processes
8問 • 3ヶ月前1 Airconditioning - Pressurization
1 Airconditioning - Pressurization
Via · 59問 · 3ヶ月前1 Airconditioning - Pressurization
1 Airconditioning - Pressurization
59問 • 3ヶ月前Commercial Package Policy Quiz 4
Commercial Package Policy Quiz 4
ユーザ名非公開 · 15問 · 3ヶ月前Commercial Package Policy Quiz 4
Commercial Package Policy Quiz 4
15問 • 3ヶ月前10 Hydraulic System
10 Hydraulic System
Via · 62問 · 4ヶ月前10 Hydraulic System
10 Hydraulic System
62問 • 4ヶ月前9 Fuel System
9 Fuel System
Via · 49問 · 4ヶ月前9 Fuel System
9 Fuel System
49問 • 4ヶ月前5 Indicating / Recording Systems
5 Indicating / Recording Systems
Via · 21問 · 4ヶ月前5 Indicating / Recording Systems
5 Indicating / Recording Systems
21問 • 4ヶ月前CDI 108 PRELIM
CDI 108 PRELIM
#100 · 46問 · 4ヶ月前CDI 108 PRELIM
CDI 108 PRELIM
46問 • 4ヶ月前COMPUTER 2ND QUARTER
COMPUTER 2ND QUARTER
Karla Marie Ybañez · 38問 · 4ヶ月前COMPUTER 2ND QUARTER
COMPUTER 2ND QUARTER
38問 • 4ヶ月前セキュリティ
セキュリティ
akari · 100問 · 4ヶ月前セキュリティ
セキュリティ
100問 • 4ヶ月前セキュリティ
セキュリティ
akari · 64問 · 4ヶ月前セキュリティ
セキュリティ
64問 • 4ヶ月前Introduction to Computing
Introduction to Computing
ユーザ名非公開 · 19問 · 4ヶ月前Introduction to Computing
Introduction to Computing
19問 • 4ヶ月前finals
finals
Adrian Ramirez · 35問 · 5ヶ月前finals
finals
35問 • 5ヶ月前REMEDIAL
REMEDIAL
The R.S.S.H Delivery Company · 5問 · 5ヶ月前REMEDIAL
REMEDIAL
5問 • 5ヶ月前28 ) SY EX. 12 | COMPLETE
28 ) SY EX. 12 | COMPLETE
The R.S.S.H Delivery Company · 85問 · 5ヶ月前28 ) SY EX. 12 | COMPLETE
28 ) SY EX. 12 | COMPLETE
85問 • 5ヶ月前問題一覧
1
- Mandatory vacations
2
- Separation of duties
3
- Dual control
4
- Least privilege
5
- FISMA
6
- COPPA
7
- SOX
8
- HIPPA
9
- White team
10
- Purple team
11
- Blue team
12
- Red team
13
- Diamond Model of Intrusion Analysis
14
- Cyber Kill Chain
15
- OWASP Testing Guide
16
- MITRE ATT&CK
17
- dd
18
- touch
19
- rm
20
- wget
21
- Attack surface
22
- Threat model
23
- Attack vector
24
- Adversary capability set
25
- ScoutSuite
26
- Prowler
27
- OpenVAS
28
- Pacu
29
- Diamond Model of Intrusion Analysis
30
- Open I.O.C.
31
- MITRE ATT&CK framework
32
- Lockheed Martin cyber kill chain
33
- Output encoding
34
- Error handling
35
- Input validation
36
- Session management
37
- Service provider ( S.P. )
38
- Relying party ( R.P. )
39
- Identity provider (IdP)
40
- Single sign-on (SSO)
41
- ESTABLISHED
42
- CLOSE_WAIT
43
- LAST_ACK
44
- LISTENING
45
- Behavior
46
- Heuristic
47
- Anomaly
48
- Trend
49
- Procedures
50
- Policies
51
- Guidelines
52
- Framework
53
- Full packet capture
54
- Net flow capture
55
- Software design documentation review
56
- SIEM event log monitoring
57
- CPU registers and cache memory (L1/L2/L3/GPU), - The contents of system memory (RAM), including a routing table, ARP cache, process tables, kernel statistics, and temporary file systems/swap space/virtual memory., - Collection of data storage devices like hard drives, SSDs, and flash memory devices., - Backup tapes, external media devices (hard drives, DVDs, etc.), and even configuration data or network diagrams
58
- Cross-Site Scripting (XSS)
59
- Spectre Attack
60
- Poodle Attack
61
- SolarWinds SUNBURST Attack
62
- Injection Attacks
63
- Ghostcat
64
- F5 BIG-IP Traffic Management User Interface (TMUI) Remote Code Execution Vulnerability
65
- Shattered Attack
66
- Diamond Model of Intrusion Analysis
67
- MITRE ATT&CK
68
- OSS TMM
69
- Cyber Kill Chain
70
- Capability
71
- Adversary
72
- Infrastructure
73
- Victim
74
- Adversary
75
- Infrastructure
76
- Victim
77
- Capability
78
- Forensic analysis
79
- Root cause analysis
80
- Incident response plan
81
- Lessons learned
82
- MS17-010
83
- MS16-120
84
- MS17-011
85
- MS16-098
86
- tcpdump
87
- Ping
88
- Wireshark
89
- Nmap