問題一覧
1
- Level 0, - System is unusable. This indicates a complete system failure or a kernel panic. Immediate action is required.
2
- Level 1, - Immediate action must be taken. This means a condition that should be corrected immediately, such as a loss of primary internet connection or database corruption.
3
- Level 2, - Critical conditions. These are serious conditions, like hardware failures (e.g., a disk drive malfunction) or critical system errors.
4
- Level 3, - Error conditions. These indicate error conditions that might not immediately impact system usability but require attention, such as an application crash or service interruption.
5
- Level 4, - Warning conditions. These are potential issues that might lead to problems if not addressed, like low disk space or high CPU usage.
6
- Level 5, - Normal but significant condition. These are normal operational events that are noteworthy, such as a successful system startup or shutdown, or a configuration change.
7
- Level 6, - Informational messages. These are routine information about the operation of the device, typically for analysis and monitoring.
8
- Level 7, - Debugging messages. These are highly detailed messages typically used for troubleshooting and diagnostics during development or specific problem-solving.
9
- OpenIOC
10
- MITRE ATT&CK framework
11
- Lockheed Martin cyber kill chain
12
- Diamond Model of Intrusion Analysis
13
- Dissemination
14
- Analysis
15
- Feedback
16
- Collection
17
- Command Injection
18
- Cross-Site Scripting (XSS)
19
- Buffer Overflow
20
- SQL Injection
21
- OpenID Connect
22
- Security Assertion Markup Language (SAML)
23
- Kerberos
24
- Active Directory Federation Services (ADFS)
25
- Continuous deployment
26
- Continuous integration
27
- Continuous monitoring
28
- Continuous delivery
29
- EternalBlue
30
- Badlock
31
- DROWN
32
- Apache Struts
33
- XCCDF (extensible configuration checklist description format )
34
- Common Platform Enumeration ( C.P.E. )
35
- Common Vulnerabilities and Exposures ( C.V.E. )
36
- Common Configuration Enumeration ( C.C.E. )
37
- SCADA ( supervisory control and data acquisition )
38
- CAN ( controller area network )
39
- SoC ( System-on-chip )
40
- BAS ( building automation system )
41
- Human resource system
42
- Provisioning engine
43
- LDAP
44
- Auditing system
45
- Data owner
46
- Privacy officer
47
- Data steward
48
- Data custodian
49
- Gramm-Leach-Bliley Act (GLBA)
50
- Health Insurance Portability and Accountability Act (HIPPA)
51
- Sarbanes-Oxley (SOX)
52
- Family Educational Rights and Privacy Act (FERPA)
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- Level 0, - System is unusable. This indicates a complete system failure or a kernel panic. Immediate action is required.
2
- Level 1, - Immediate action must be taken. This means a condition that should be corrected immediately, such as a loss of primary internet connection or database corruption.
3
- Level 2, - Critical conditions. These are serious conditions, like hardware failures (e.g., a disk drive malfunction) or critical system errors.
4
- Level 3, - Error conditions. These indicate error conditions that might not immediately impact system usability but require attention, such as an application crash or service interruption.
5
- Level 4, - Warning conditions. These are potential issues that might lead to problems if not addressed, like low disk space or high CPU usage.
6
- Level 5, - Normal but significant condition. These are normal operational events that are noteworthy, such as a successful system startup or shutdown, or a configuration change.
7
- Level 6, - Informational messages. These are routine information about the operation of the device, typically for analysis and monitoring.
8
- Level 7, - Debugging messages. These are highly detailed messages typically used for troubleshooting and diagnostics during development or specific problem-solving.
9
- OpenIOC
10
- MITRE ATT&CK framework
11
- Lockheed Martin cyber kill chain
12
- Diamond Model of Intrusion Analysis
13
- Dissemination
14
- Analysis
15
- Feedback
16
- Collection
17
- Command Injection
18
- Cross-Site Scripting (XSS)
19
- Buffer Overflow
20
- SQL Injection
21
- OpenID Connect
22
- Security Assertion Markup Language (SAML)
23
- Kerberos
24
- Active Directory Federation Services (ADFS)
25
- Continuous deployment
26
- Continuous integration
27
- Continuous monitoring
28
- Continuous delivery
29
- EternalBlue
30
- Badlock
31
- DROWN
32
- Apache Struts
33
- XCCDF (extensible configuration checklist description format )
34
- Common Platform Enumeration ( C.P.E. )
35
- Common Vulnerabilities and Exposures ( C.V.E. )
36
- Common Configuration Enumeration ( C.C.E. )
37
- SCADA ( supervisory control and data acquisition )
38
- CAN ( controller area network )
39
- SoC ( System-on-chip )
40
- BAS ( building automation system )
41
- Human resource system
42
- Provisioning engine
43
- LDAP
44
- Auditing system
45
- Data owner
46
- Privacy officer
47
- Data steward
48
- Data custodian
49
- Gramm-Leach-Bliley Act (GLBA)
50
- Health Insurance Portability and Accountability Act (HIPPA)
51
- Sarbanes-Oxley (SOX)
52
- Family Educational Rights and Privacy Act (FERPA)