問題一覧
1
- Database vulnerability scan
2
- Availability
3
- Data classification
4
- Backups
5
- Upgrade Windows.
6
- Reconnaissance
7
- Ask the DBA to recheck the database server.
8
- This is a false positive report.
9
- HTTP
10
- Mark the report as a false positive.
11
- The vulnerability scanner depends on version detection.
12
- Email server
13
- NetFlow logs
14
- sudo
15
- An attacker can eavesdrop on authentication exchanges.
16
- Reconnaissance
17
- Apply security patches.
18
- Block inbound connections on port 80 using the host firewall.
19
- ARP tables
20
- The scan sensitivity is set to exclude low-importance vulnerabilities.
21
- No action is necessary.
22
- Agent-based monitoring
23
- Vulnerability 1
24
- Apply the patch using a GPO.
25
- Vulnerability 2
26
- Restrict interactive logins to the system.
27
- Garrett should perform both internal and external scanning.
28
- Document the vulnerability as an approved exception.
29
- All three types of scans are equally important.
30
- The printer is running an embedded web server.
31
- 389
32
- Decrease the scan sensitivity.
33
- Input validation
34
- D
35
- Reduce the scanning frequency.
36
- Upgrade the web server.
37
- There is no direct vulnerability, but this information points to other possible vulnerabilities on the server.
38
- An attacker could exploit this vulnerability to gain access to servers managed by the administrator.
39
- Immediately
40
- Immediately
41
- Network segmentation
42
- 12.8.1.100
43
- A firewall configuration is preventing the scan from succeeding.
44
- Thomas should apply the patch and then follow up with an emergency change request after work is complete.
45
- Remove this framework from the affected systems.
46
- Credentialed scan
47
- Configure the vulnerability scanner to open a trouble ticket when they detect a new vulnerability on a server.
48
- Daily
49
- Run Windows Update.
50
- This is a critical issue that requires immediate adjustment of firewall rules.
51
- This server requires one or more Linux patches.
52
- Review and secure server accounts.
53
- Encryption
54
- Kai should deploy the patch in a sandbox environment to test it prior to applying it in production.
55
- Web application SQL injection vulnerability
56
- The browser developer
57
- Oracle Database TNS Listener Poison Attack vulnerability
58
- Eric does not have permission to perform the scan.
59
- Firewall rules
60
- Asset inventory
61
- Upgrade Nessus.
62
- Passive network monitoring
63
- Max simultaneous hosts per scan.
64
- Require VPN access for remote connections to the database server.
65
- Failure to perform input validation
66
- 10.0.102.58
67
- Enable credentialed scanning.
68
- Install a web application firewall.
69
- The server is for internal use only.
70
- Blind SQL iniection
71
- Remove the file from the server.
72
- Mark the vulnerability as an exception.
73
- Update the vulnerability feed.
74
- Server-based scanning
75
- SHA-256
76
- All users will be able to access the site, but some may see an error message.
77
- Request a new certificate.
78
- 22
79
- Replace the certificate.
80
- Run scans in a quiet manner without alerting other IT staff to the scans or their results to minimize the impact of false information.
81
- Set Up Host Authentication
82
- Risk appetite
83
- Test systems are not available for all production systems.
84
- O
85
- Credit card data
86
- Reduce the sensitivity of the scans.
87
- Schedule scans so that they run during periods of low activity.
88
- True positive
89
- Risk acceptance
90
- User acceptance testing
91
- Stress testing
competence 4
competence 4
ユーザ名非公開 · 100問 · 1ヶ月前competence 4
competence 4
100問 • 1ヶ月前(Finals) Professional issues in Information Technology Mocktest BSIT 505
(Finals) Professional issues in Information Technology Mocktest BSIT 505
Xai Alexandrei Delos Reyes · 27問 · 1ヶ月前(Finals) Professional issues in Information Technology Mocktest BSIT 505
(Finals) Professional issues in Information Technology Mocktest BSIT 505
27問 • 1ヶ月前Competence 9
Competence 9
Emm · 116問 · 2ヶ月前Competence 9
Competence 9
116問 • 2ヶ月前competence 7
competence 7
Emm · 20問 · 2ヶ月前competence 7
competence 7
20問 • 2ヶ月前Competence 6
Competence 6
Emm · 146問 · 2ヶ月前Competence 6
Competence 6
146問 • 2ヶ月前COMPETENCE 5
COMPETENCE 5
Emm · 153問 · 2ヶ月前COMPETENCE 5
COMPETENCE 5
153問 • 2ヶ月前Competence 3
Competence 3
Emm · 100問 · 2ヶ月前Competence 3
Competence 3
100問 • 2ヶ月前Competence 3
Competence 3
Emm · 60問 · 2ヶ月前Competence 3
Competence 3
60問 • 2ヶ月前M11c19⚡️
M11c19⚡️
مقطع من الاغاني عراقيه قصيره · 20問 · 2ヶ月前M11c19⚡️
M11c19⚡️
20問 • 2ヶ月前cyber crime ict
cyber crime ict
Desa Mae Santiago · 12問 · 3ヶ月前cyber crime ict
cyber crime ict
12問 • 3ヶ月前COMPUTER 2ND QUARTER
COMPUTER 2ND QUARTER
Karla Marie Ybañez · 38問 · 4ヶ月前COMPUTER 2ND QUARTER
COMPUTER 2ND QUARTER
38問 • 4ヶ月前セキュリティ
セキュリティ
akari · 100問 · 4ヶ月前セキュリティ
セキュリティ
100問 • 4ヶ月前セキュリティ
セキュリティ
akari · 64問 · 4ヶ月前セキュリティ
セキュリティ
64問 • 4ヶ月前L.O. | The Threat Intelligence Cycle
L.O. | The Threat Intelligence Cycle
The R.S.S.H Delivery Company · 40問 · 4ヶ月前L.O. | The Threat Intelligence Cycle
L.O. | The Threat Intelligence Cycle
40問 • 4ヶ月前Introduction to Computing
Introduction to Computing
ユーザ名非公開 · 19問 · 4ヶ月前Introduction to Computing
Introduction to Computing
19問 • 4ヶ月前Data and Digital Communication Mocktest (Prelim) BSIT 505
Data and Digital Communication Mocktest (Prelim) BSIT 505
Xai Alexandrei Delos Reyes · 60問 · 4ヶ月前Data and Digital Communication Mocktest (Prelim) BSIT 505
Data and Digital Communication Mocktest (Prelim) BSIT 505
60問 • 4ヶ月前✅ SY EX | 1 MASTER
✅ SY EX | 1 MASTER
The R.S.S.H Delivery Company · 250問 · 5ヶ月前✅ SY EX | 1 MASTER
✅ SY EX | 1 MASTER
250問 • 5ヶ月前css
css
En. km · 33問 · 5ヶ月前css
css
33問 • 5ヶ月前Css 3 quiz
Css 3 quiz
En. km · 36問 · 5ヶ月前Css 3 quiz
Css 3 quiz
36問 • 5ヶ月前25 ) SY EX. 9 | COMPLETE
25 ) SY EX. 9 | COMPLETE
The R.S.S.H Delivery Company · 15問 · 5ヶ月前25 ) SY EX. 9 | COMPLETE
25 ) SY EX. 9 | COMPLETE
15問 • 5ヶ月前問題一覧
1
- Database vulnerability scan
2
- Availability
3
- Data classification
4
- Backups
5
- Upgrade Windows.
6
- Reconnaissance
7
- Ask the DBA to recheck the database server.
8
- This is a false positive report.
9
- HTTP
10
- Mark the report as a false positive.
11
- The vulnerability scanner depends on version detection.
12
- Email server
13
- NetFlow logs
14
- sudo
15
- An attacker can eavesdrop on authentication exchanges.
16
- Reconnaissance
17
- Apply security patches.
18
- Block inbound connections on port 80 using the host firewall.
19
- ARP tables
20
- The scan sensitivity is set to exclude low-importance vulnerabilities.
21
- No action is necessary.
22
- Agent-based monitoring
23
- Vulnerability 1
24
- Apply the patch using a GPO.
25
- Vulnerability 2
26
- Restrict interactive logins to the system.
27
- Garrett should perform both internal and external scanning.
28
- Document the vulnerability as an approved exception.
29
- All three types of scans are equally important.
30
- The printer is running an embedded web server.
31
- 389
32
- Decrease the scan sensitivity.
33
- Input validation
34
- D
35
- Reduce the scanning frequency.
36
- Upgrade the web server.
37
- There is no direct vulnerability, but this information points to other possible vulnerabilities on the server.
38
- An attacker could exploit this vulnerability to gain access to servers managed by the administrator.
39
- Immediately
40
- Immediately
41
- Network segmentation
42
- 12.8.1.100
43
- A firewall configuration is preventing the scan from succeeding.
44
- Thomas should apply the patch and then follow up with an emergency change request after work is complete.
45
- Remove this framework from the affected systems.
46
- Credentialed scan
47
- Configure the vulnerability scanner to open a trouble ticket when they detect a new vulnerability on a server.
48
- Daily
49
- Run Windows Update.
50
- This is a critical issue that requires immediate adjustment of firewall rules.
51
- This server requires one or more Linux patches.
52
- Review and secure server accounts.
53
- Encryption
54
- Kai should deploy the patch in a sandbox environment to test it prior to applying it in production.
55
- Web application SQL injection vulnerability
56
- The browser developer
57
- Oracle Database TNS Listener Poison Attack vulnerability
58
- Eric does not have permission to perform the scan.
59
- Firewall rules
60
- Asset inventory
61
- Upgrade Nessus.
62
- Passive network monitoring
63
- Max simultaneous hosts per scan.
64
- Require VPN access for remote connections to the database server.
65
- Failure to perform input validation
66
- 10.0.102.58
67
- Enable credentialed scanning.
68
- Install a web application firewall.
69
- The server is for internal use only.
70
- Blind SQL iniection
71
- Remove the file from the server.
72
- Mark the vulnerability as an exception.
73
- Update the vulnerability feed.
74
- Server-based scanning
75
- SHA-256
76
- All users will be able to access the site, but some may see an error message.
77
- Request a new certificate.
78
- 22
79
- Replace the certificate.
80
- Run scans in a quiet manner without alerting other IT staff to the scans or their results to minimize the impact of false information.
81
- Set Up Host Authentication
82
- Risk appetite
83
- Test systems are not available for all production systems.
84
- O
85
- Credit card data
86
- Reduce the sensitivity of the scans.
87
- Schedule scans so that they run during periods of low activity.
88
- True positive
89
- Risk acceptance
90
- User acceptance testing
91
- Stress testing