ID: C2 Deep Pt.2
問題一覧
1
an email-based or web-based form of phishing that targets senior executives or wealthy individuals.
2
fraudulent practice of sending emails from a seemingly known or trusted sender to induce targeted individuals to reveal confidential information.
3
an email-based social engineering attack in which the attacker sends an email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.
4
social-engineering attack where the attacker extracts information while speaking over the phone or leveraging IP-based voice messaging services (VolP).
5
Whaling
6
Spear phishing
7
Phishing
8
Vishing
9
CD File System / ISO 9660
10
legacy file system used for CD optical disc media (CD-ROM and CD-R).
11
Universal Disk Format / ISO 13346
12
an updated file system for optical media supporting multisession writing. It is the standard used by Windows, referred to as the Live File System.
13
NT File System
14
a Windows file system that supports a 64-bit address space and can provide extra features such as file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas.
15
File Allocation Table 32bit FAT32
16
32-bit file system supported by Windows, macOS, and Linux computers.
17
CD File System (CDFS or ISO 9660)
18
Universal Disk Format (UDF or ISO 13346)
19
NT File System (NTFS)
20
File Allocation Table 32bit FAT32
21
an extension to TACACS (Terminal Access Controller Access Control System) and was developed as a proprietary protocol by Cisco.
22
Terminal Access Controller Access Control System
23
Remote Authentication Dial in User Service
24
a networking protocol that operates on port 1812 and provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service, but Cisco did not develop it.
25
is a network authentication protocol designed to provide strong mutual authentication for client/server applications using secret-key cryptography developed by MIT.
26
Challenge Handshake Authentication Protocol
27
used to authenticate a user or network host to an authenticating entity.
28
TACACS+
29
The Remote Authentication Dial-In User Service (RADIUS)
30
Kerberos
31
Challenge-Handshake Authentication Protocol (CHAP)
32
the most common vulnerability found on both Windows and Linux systems. When a security patch is released, attackers begin to reverse engineer the security patch to exploit the vulnerability.
33
type of injection in which malicious scripts are injected into otherwise benign and trusted websites.
34
a software application coding vulnerability that occurs when an attacker injects a CRLF character sequence where it is not expected.
35
placement of malicious code in SQL statements via web page input. Commonly used against databases, but they are not useful when attacking file servers.
36
Missing patches
37
Cross-Site Scripting (XSS)
38
CRLF injection
39
SQL injection
40
stores a single character, such as J, D, or Z. A character data type usually consumes one byte (8 bits) of storage.
41
stores a group of characters, such as Hello, PYTHON, or JasonDion.
42
stores a value of TRUE (1) or FALSE (0). It usually consumes only 1 bit of storage (a zero or a one).
43
stores a whole number, such as 21, 143, or 1024. This data type usually consumes 8 bytes of storage.
44
Character
45
String
46
Boolean
47
Integer
48
Wired Equivalent Privacy
49
encryption system based on the RC4 encryption cipher. This system uses a 40-bit encryption key and a 24-bit initialization vector by default, creating a 64-bit key.
50
WiFi protected access
51
improved encryption scheme for protecting Wi-Fi communications designed to replace WEP. This scheme uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.
52
WiFi Protected Access Version 2
53
replaced the original version of WPA after the completion of the 802.11i security standard. It features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks.
54
does not use an encryption key or preshared key to protect the network
55
Wired Equivalent Privacy (WEP)
56
Wi-Fi protected access (WPA)
57
Wi-Fi protected access version 2 (WPA2)
58
Open Network
59
System File Checker
60
primary administrative tool for defining and controlling how programs, network resources, and the operating system operate for users and computers in an organization.
61
used to update the group policy settings on a Windows system.
62
used to display the Resultant Set of Policy (RSoP) information for a remote user and computer. Because you can apply overlapping policy settings to any computer or user, the Group Policy feature generates a resulting set of policy settings when the user logs on. This command displays the resulting set of policy settings that were enforced on the computer for the specified user when the user logged on.
63
Deployment Image Servicing and Management
64
used to mount and service Windows images before deployment.
65
Group Policy
66
gpupdate command-line tool
67
gpresult command-line tool
68
Deployment Image Servicing and Management command-line tool (DISM)
69
attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The passcode or password is incrementally increased by one letter number each time until the right passcode/password is found.
70
a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary.
71
a precomputed list of possible hashes used when trying to speed up the process of password cracking.
72
combines the use of a brute-force attack with a dictionary attack by using words from the dictionary's list as the basis for the brute-force attack.
73
Brute Force Attack
74
Dictionary Attack
75
Rainbow Table
76
Hybrid Password Cracking Attack
77
a security posture where the system will only allow an item to traverse the firewall if the traffic matches an existing rule.
78
a security posture where the system will allow all traffic to traverse the firewall unless there is a specific rule to prevent it.
79
used to mirror or synchronize directories and their contents. This tool, will check the destination directory and remove files no longer in the main tree. It also checks the files in the destination directory against the files to be copied and doesn't waste time copying unchanged files.
80
copies all of the files from one directory to another.
81
used to copy one or more files from one location to another. This command cannot copy files that are 0 bytes long or for copying all of a directory's files and subdirectories.
82
used in Linux to copy one or more files and directories from one location to another.
83
The robocopy tool
84
The xcopy tool
85
The copy command
86
The cp command
87
Simultaneous Authentication of Equals
88
the dragonfly handshake
89
Temporal Key Integrity Protocol
90
WiFi Protected Access Version 3
91
WiFi Protected Access Version 2
92
WiFi Protected Access
93
Wired Equivalent Privacy
94
has replaced WPA2 as the most secure wireless encryption method. This access version uses the simultaneous authentication of equals (SAE) to increase the security of preshared keys.
95
replaced the original version of WPA after the completion of the 802.11i security standard. WPA2 features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks. WPA2 uses the improved AES cipher with counter mode with cipher-block chaining message authentication protocol (CCMP) for encryption.
96
an improved encryption scheme for protecting Wi-Fi communications designed to replace WEP. This system uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.
97
an older mechanism for encrypting data sent over a wireless connection. This is considered vulnerable to attacks that can break its encryption. WEP relies on the use of a 24-bit initialization vector to secure its preshared key.
98
Wi-Fi Protected Access Version 3 (WPA3)
DION#1
DION#1
Mixtapes øf Hanna · 90問 · 1年前DION#1
DION#1
90問 • 1年前DION#2
DION#2
Mixtapes øf Hanna · 90問 · 1年前DION#2
DION#2
90問 • 1年前DION#3
DION#3
Mixtapes øf Hanna · 90問 · 1年前DION#3
DION#3
90問 • 1年前DION#4
DION#4
Mixtapes øf Hanna · 90問 · 1年前DION#4
DION#4
90問 • 1年前DION#5
DION#5
Mixtapes øf Hanna · 89問 · 1年前DION#5
DION#5
89問 • 1年前DION#6
DION#6
Mixtapes øf Hanna · 87問 · 1年前DION#6
DION#6
87問 • 1年前ID: PT.1 COLLABORATE
ID: PT.1 COLLABORATE
Mixtapes øf Hanna · 95問 · 1年前ID: PT.1 COLLABORATE
ID: PT.1 COLLABORATE
95問 • 1年前ID: C2 Deep Pt.1
ID: C2 Deep Pt.1
Mixtapes øf Hanna · 90問 · 1年前ID: C2 Deep Pt.1
ID: C2 Deep Pt.1
90問 • 1年前ID: C2 Deep Pt.3
ID: C2 Deep Pt.3
Mixtapes øf Hanna · 93問 · 1年前ID: C2 Deep Pt.3
ID: C2 Deep Pt.3
93問 • 1年前ID: C2 Deep Pt.4
ID: C2 Deep Pt.4
Mixtapes øf Hanna · 85問 · 1年前ID: C2 Deep Pt.4
ID: C2 Deep Pt.4
85問 • 1年前OL BOYS STUDY GUIDE
OL BOYS STUDY GUIDE
Mixtapes øf Hanna · 70問 · 1年前OL BOYS STUDY GUIDE
OL BOYS STUDY GUIDE
70問 • 1年前MASTER REVIEW
MASTER REVIEW
Mixtapes øf Hanna · 44問 · 1年前MASTER REVIEW
MASTER REVIEW
44問 • 1年前EC: C2 Deep PT.1
EC: C2 Deep PT.1
Mixtapes øf Hanna · 96問 · 1年前EC: C2 Deep PT.1
EC: C2 Deep PT.1
96問 • 1年前EC: C2 Deep PT.2
EC: C2 Deep PT.2
Mixtapes øf Hanna · 89問 · 1年前EC: C2 Deep PT.2
EC: C2 Deep PT.2
89問 • 1年前EC: C2 Deep Pt.3
EC: C2 Deep Pt.3
Mixtapes øf Hanna · 94問 · 1年前EC: C2 Deep Pt.3
EC: C2 Deep Pt.3
94問 • 1年前EC: C2 Deep Pt.4
EC: C2 Deep Pt.4
Mixtapes øf Hanna · 91問 · 1年前EC: C2 Deep Pt.4
EC: C2 Deep Pt.4
91問 • 1年前EC: C2 Deep Pt.5
EC: C2 Deep Pt.5
Mixtapes øf Hanna · 88問 · 1年前EC: C2 Deep Pt.5
EC: C2 Deep Pt.5
88問 • 1年前問題一覧
1
an email-based or web-based form of phishing that targets senior executives or wealthy individuals.
2
fraudulent practice of sending emails from a seemingly known or trusted sender to induce targeted individuals to reveal confidential information.
3
an email-based social engineering attack in which the attacker sends an email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.
4
social-engineering attack where the attacker extracts information while speaking over the phone or leveraging IP-based voice messaging services (VolP).
5
Whaling
6
Spear phishing
7
Phishing
8
Vishing
9
CD File System / ISO 9660
10
legacy file system used for CD optical disc media (CD-ROM and CD-R).
11
Universal Disk Format / ISO 13346
12
an updated file system for optical media supporting multisession writing. It is the standard used by Windows, referred to as the Live File System.
13
NT File System
14
a Windows file system that supports a 64-bit address space and can provide extra features such as file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas.
15
File Allocation Table 32bit FAT32
16
32-bit file system supported by Windows, macOS, and Linux computers.
17
CD File System (CDFS or ISO 9660)
18
Universal Disk Format (UDF or ISO 13346)
19
NT File System (NTFS)
20
File Allocation Table 32bit FAT32
21
an extension to TACACS (Terminal Access Controller Access Control System) and was developed as a proprietary protocol by Cisco.
22
Terminal Access Controller Access Control System
23
Remote Authentication Dial in User Service
24
a networking protocol that operates on port 1812 and provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service, but Cisco did not develop it.
25
is a network authentication protocol designed to provide strong mutual authentication for client/server applications using secret-key cryptography developed by MIT.
26
Challenge Handshake Authentication Protocol
27
used to authenticate a user or network host to an authenticating entity.
28
TACACS+
29
The Remote Authentication Dial-In User Service (RADIUS)
30
Kerberos
31
Challenge-Handshake Authentication Protocol (CHAP)
32
the most common vulnerability found on both Windows and Linux systems. When a security patch is released, attackers begin to reverse engineer the security patch to exploit the vulnerability.
33
type of injection in which malicious scripts are injected into otherwise benign and trusted websites.
34
a software application coding vulnerability that occurs when an attacker injects a CRLF character sequence where it is not expected.
35
placement of malicious code in SQL statements via web page input. Commonly used against databases, but they are not useful when attacking file servers.
36
Missing patches
37
Cross-Site Scripting (XSS)
38
CRLF injection
39
SQL injection
40
stores a single character, such as J, D, or Z. A character data type usually consumes one byte (8 bits) of storage.
41
stores a group of characters, such as Hello, PYTHON, or JasonDion.
42
stores a value of TRUE (1) or FALSE (0). It usually consumes only 1 bit of storage (a zero or a one).
43
stores a whole number, such as 21, 143, or 1024. This data type usually consumes 8 bytes of storage.
44
Character
45
String
46
Boolean
47
Integer
48
Wired Equivalent Privacy
49
encryption system based on the RC4 encryption cipher. This system uses a 40-bit encryption key and a 24-bit initialization vector by default, creating a 64-bit key.
50
WiFi protected access
51
improved encryption scheme for protecting Wi-Fi communications designed to replace WEP. This scheme uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.
52
WiFi Protected Access Version 2
53
replaced the original version of WPA after the completion of the 802.11i security standard. It features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks.
54
does not use an encryption key or preshared key to protect the network
55
Wired Equivalent Privacy (WEP)
56
Wi-Fi protected access (WPA)
57
Wi-Fi protected access version 2 (WPA2)
58
Open Network
59
System File Checker
60
primary administrative tool for defining and controlling how programs, network resources, and the operating system operate for users and computers in an organization.
61
used to update the group policy settings on a Windows system.
62
used to display the Resultant Set of Policy (RSoP) information for a remote user and computer. Because you can apply overlapping policy settings to any computer or user, the Group Policy feature generates a resulting set of policy settings when the user logs on. This command displays the resulting set of policy settings that were enforced on the computer for the specified user when the user logged on.
63
Deployment Image Servicing and Management
64
used to mount and service Windows images before deployment.
65
Group Policy
66
gpupdate command-line tool
67
gpresult command-line tool
68
Deployment Image Servicing and Management command-line tool (DISM)
69
attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The passcode or password is incrementally increased by one letter number each time until the right passcode/password is found.
70
a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary.
71
a precomputed list of possible hashes used when trying to speed up the process of password cracking.
72
combines the use of a brute-force attack with a dictionary attack by using words from the dictionary's list as the basis for the brute-force attack.
73
Brute Force Attack
74
Dictionary Attack
75
Rainbow Table
76
Hybrid Password Cracking Attack
77
a security posture where the system will only allow an item to traverse the firewall if the traffic matches an existing rule.
78
a security posture where the system will allow all traffic to traverse the firewall unless there is a specific rule to prevent it.
79
used to mirror or synchronize directories and their contents. This tool, will check the destination directory and remove files no longer in the main tree. It also checks the files in the destination directory against the files to be copied and doesn't waste time copying unchanged files.
80
copies all of the files from one directory to another.
81
used to copy one or more files from one location to another. This command cannot copy files that are 0 bytes long or for copying all of a directory's files and subdirectories.
82
used in Linux to copy one or more files and directories from one location to another.
83
The robocopy tool
84
The xcopy tool
85
The copy command
86
The cp command
87
Simultaneous Authentication of Equals
88
the dragonfly handshake
89
Temporal Key Integrity Protocol
90
WiFi Protected Access Version 3
91
WiFi Protected Access Version 2
92
WiFi Protected Access
93
Wired Equivalent Privacy
94
has replaced WPA2 as the most secure wireless encryption method. This access version uses the simultaneous authentication of equals (SAE) to increase the security of preshared keys.
95
replaced the original version of WPA after the completion of the 802.11i security standard. WPA2 features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks. WPA2 uses the improved AES cipher with counter mode with cipher-block chaining message authentication protocol (CCMP) for encryption.
96
an improved encryption scheme for protecting Wi-Fi communications designed to replace WEP. This system uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.
97
an older mechanism for encrypting data sent over a wireless connection. This is considered vulnerable to attacks that can break its encryption. WEP relies on the use of a 24-bit initialization vector to secure its preshared key.
98
Wi-Fi Protected Access Version 3 (WPA3)