問題一覧
1
- Clear
2
- Purge
3
- Destroy
4
- Degauss
5
- Clear
6
- Purge
7
- Destroy
8
- Degauss
9
-e
10
-X
11
-nn
12
-n
13
- Delivery
14
- Command and Control
15
- Installation
16
- Reconnaissance
17
- Open Source Security Testing Methodology Manual (OSS TMM)
18
- Diamond Model of Intrusion Analysis
19
- MITRE ATT&CK
20
- OWASP Testing Guide
21
- FERPA
22
- GLBA
23
- SOX
24
- HIPAA
25
- Technical architecture
26
- Data architecture
27
- Business architecture
28
- Applications architecture
29
- Insecure direct object reference
30
- Weak or default configurations
31
- Improper error handling
32
- Race condition
33
- TCP ACK
34
- TCP SYN
35
- TCP RST
36
- XMAS TREE
37
- Weaponization
38
- Actions and Objectives
39
- Delivery
40
- Command and Control
41
- Lessons learned
42
- Forensic analysis
43
- Root cause analysis
44
- Tabletop exercise
45
- Rules of engagement
46
- Memorandum of understanding
47
- Acceptable use policy
48
- Service Level Agreement ( S.L.A. )
49
- SNMP
50
- SMTP
51
- BGP
52
- EIGRP
53
- Golden ticket
54
- Lateral movement
55
- Pass the hash
56
- Pivoting
57
- TACACS+
58
- RADIUS
59
- CHAP
60
- Kerberos
61
- Data enrichment
62
- Continuous integration
63
- Machine learning
64
- Deep learning
65
- nmap -sT
66
- nmap -sX
67
- nmap -O
68
- nmap -sS
69
- Infrastructure
70
- Capability
71
- Victim
72
- Adversary
73
- False positive
74
- False negative
75
- True positive
76
- True negative
77
- ASLR
78
- DEP
79
- DLL
80
- DLP
81
- Command and Control
82
- Delivery
83
- Exploitation
84
- Weaponization
85
- Memdump
86
- dd
87
- Wireshark
88
- Nessus
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- Clear
2
- Purge
3
- Destroy
4
- Degauss
5
- Clear
6
- Purge
7
- Destroy
8
- Degauss
9
-e
10
-X
11
-nn
12
-n
13
- Delivery
14
- Command and Control
15
- Installation
16
- Reconnaissance
17
- Open Source Security Testing Methodology Manual (OSS TMM)
18
- Diamond Model of Intrusion Analysis
19
- MITRE ATT&CK
20
- OWASP Testing Guide
21
- FERPA
22
- GLBA
23
- SOX
24
- HIPAA
25
- Technical architecture
26
- Data architecture
27
- Business architecture
28
- Applications architecture
29
- Insecure direct object reference
30
- Weak or default configurations
31
- Improper error handling
32
- Race condition
33
- TCP ACK
34
- TCP SYN
35
- TCP RST
36
- XMAS TREE
37
- Weaponization
38
- Actions and Objectives
39
- Delivery
40
- Command and Control
41
- Lessons learned
42
- Forensic analysis
43
- Root cause analysis
44
- Tabletop exercise
45
- Rules of engagement
46
- Memorandum of understanding
47
- Acceptable use policy
48
- Service Level Agreement ( S.L.A. )
49
- SNMP
50
- SMTP
51
- BGP
52
- EIGRP
53
- Golden ticket
54
- Lateral movement
55
- Pass the hash
56
- Pivoting
57
- TACACS+
58
- RADIUS
59
- CHAP
60
- Kerberos
61
- Data enrichment
62
- Continuous integration
63
- Machine learning
64
- Deep learning
65
- nmap -sT
66
- nmap -sX
67
- nmap -O
68
- nmap -sS
69
- Infrastructure
70
- Capability
71
- Victim
72
- Adversary
73
- False positive
74
- False negative
75
- True positive
76
- True negative
77
- ASLR
78
- DEP
79
- DLL
80
- DLP
81
- Command and Control
82
- Delivery
83
- Exploitation
84
- Weaponization
85
- Memdump
86
- dd
87
- Wireshark
88
- Nessus