問題一覧
1
- Dual control
2
- RoE
3
- All access to financial systems must use multifactor authentication for remote connections.
4
- Guideline
5
- White team leader.
6
- 10 percent
7
- $75,000
8
- $7,500
9
- Preventive
10
- Technical
11
- Compensating control
12
- Risk mitigation
13
- Data ownership policy
14
- AUP
15
- Standard
16
- Separation of duties
17
- Cross-training
18
- Compensating control
19
- Separation of duties
20
- Data ownership policy
21
- Technical control
22
- Classification of information elements
23
- Vulnerability scanning tool
24
- CIS benchmarks
25
- Java
26
- Immunity debugger
27
- Systems will have known vulnerabilities exploited.
28
- Web application reconnaissance tool
29
- CSRF
30
- Remove affected data from the training dataset and generate a new model.
31
- To reduce the number of threat vectors
32
- Change management program
33
- Check for and apply patches from the logging vendor.
34
- Local file inclusion
35
- Managerial
36
- Preventive
37
- During the next scheduled maintenance window
38
- Encrypting the database contents
39
- Remove unnecessary rights.
40
- Monitoring network traffic and analyzing the contents for signs of unpatched systems and applications
41
- Validate a random sample of accounts.
42
- Bug bounty
43
- Improper encryption
44
- Fuzzers may not fully cover the code.
45
- Diamond
46
- Privilege escalation
47
- Delivery
48
- Event Viewer
49
- The attack vector
50
- MITRE ATT&CK
51
- Modify the hosts file.
52
- The service restarted at reboot, so she should add an override file to stop the service from starting.
53
- 10.174.238.88
54
- SSH
55
- PKI
56
- ec2-user
57
- Delete emails with the URL from inbound email.
58
- A DNS sinkhole
59
- No impact to services
60
- Denial of noncritical services
61
- Denial of critical services or loss of contro
62
- Safety systems
63
- The immediate impact on operations so that his team can restore functionality
64
- Number of copies made
65
- Proactive network segmentation
66
- A security incident
67
- Preparation
68
- She can use getfacl.
69
- Option B.
70
- Change the File Vault key using a trusted user account.
71
- A port scan
72
- Cryptographic erase
73
- There is a firewall between the remote network and the server.
74
- Encrypt the RAW file and transfer a hash and key under separate cover.
75
- Use a write blocker.
76
- Chain of custody
77
- Plug the system into an isolated switch and use a span port or tap and Wireshark/tcpdump to capture traffic.
78
- Conduct a lessons learned session.
79
- Copy the virtual disk files and then use a memory capture tool.
80
- To ensure correct reassembly
81
- Review the Apache error log.
82
- Purge, validate, and document.
83
- APFS
84
- Antiforensic activities
85
- Data carving
86
- She should select herself.
87
- No domain, administrator
88
- file
89
- Logical
90
- Chain of custody
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- Dual control
2
- RoE
3
- All access to financial systems must use multifactor authentication for remote connections.
4
- Guideline
5
- White team leader.
6
- 10 percent
7
- $75,000
8
- $7,500
9
- Preventive
10
- Technical
11
- Compensating control
12
- Risk mitigation
13
- Data ownership policy
14
- AUP
15
- Standard
16
- Separation of duties
17
- Cross-training
18
- Compensating control
19
- Separation of duties
20
- Data ownership policy
21
- Technical control
22
- Classification of information elements
23
- Vulnerability scanning tool
24
- CIS benchmarks
25
- Java
26
- Immunity debugger
27
- Systems will have known vulnerabilities exploited.
28
- Web application reconnaissance tool
29
- CSRF
30
- Remove affected data from the training dataset and generate a new model.
31
- To reduce the number of threat vectors
32
- Change management program
33
- Check for and apply patches from the logging vendor.
34
- Local file inclusion
35
- Managerial
36
- Preventive
37
- During the next scheduled maintenance window
38
- Encrypting the database contents
39
- Remove unnecessary rights.
40
- Monitoring network traffic and analyzing the contents for signs of unpatched systems and applications
41
- Validate a random sample of accounts.
42
- Bug bounty
43
- Improper encryption
44
- Fuzzers may not fully cover the code.
45
- Diamond
46
- Privilege escalation
47
- Delivery
48
- Event Viewer
49
- The attack vector
50
- MITRE ATT&CK
51
- Modify the hosts file.
52
- The service restarted at reboot, so she should add an override file to stop the service from starting.
53
- 10.174.238.88
54
- SSH
55
- PKI
56
- ec2-user
57
- Delete emails with the URL from inbound email.
58
- A DNS sinkhole
59
- No impact to services
60
- Denial of noncritical services
61
- Denial of critical services or loss of contro
62
- Safety systems
63
- The immediate impact on operations so that his team can restore functionality
64
- Number of copies made
65
- Proactive network segmentation
66
- A security incident
67
- Preparation
68
- She can use getfacl.
69
- Option B.
70
- Change the File Vault key using a trusted user account.
71
- A port scan
72
- Cryptographic erase
73
- There is a firewall between the remote network and the server.
74
- Encrypt the RAW file and transfer a hash and key under separate cover.
75
- Use a write blocker.
76
- Chain of custody
77
- Plug the system into an isolated switch and use a span port or tap and Wireshark/tcpdump to capture traffic.
78
- Conduct a lessons learned session.
79
- Copy the virtual disk files and then use a memory capture tool.
80
- To ensure correct reassembly
81
- Review the Apache error log.
82
- Purge, validate, and document.
83
- APFS
84
- Antiforensic activities
85
- Data carving
86
- She should select herself.
87
- No domain, administrator
88
- file
89
- Logical
90
- Chain of custody