security+6
問題一覧
1
MSSP
2
Hybrid environment
3
Impersonation
4
The key length of the encryption algorithm
5
AES
6
An attacker is utilizing a brute-force attack against the account.
7
CYOD
8
Access control vestibule
9
Staging
10
Dumpster diving
11
Inspect the file metadata.
12
Encrypt the disk on the storage device.
13
DNS logs
14
Evil twin
15
Hashing
16
Legal hold
17
An alarm
18
Firewall rules
19
Wireshark
20
Community
21
Enforce the use of a controlled trusted source of container images
22
Use a captive portal for user authentication., Authenticate users using OAuth for more resiliency
23
Implement S/MIME to encrypt the emails at rest
24
SOAR
25
TAXII
26
Patch each running container individually and test the application
27
Logic bomb
28
Next-generation SWG
29
Rogue access point
30
- access-rule permit tcp destination 172.16.1.5 port 80 -access-rule permit tcp destination 172.16.1.5 port 443 -access-rule deny top destination 172.16.1.5 port 21
31
Homomorphic
32
Data custodian
33
Lock accounts after five failed logons
34
RAT
35
DNS poisoning
36
Smart card
37
Utilize a WAF
38
OWASP
39
Transference
40
DNS sinkhole
41
Put the machine in containment
42
MAC flooding
43
Hiring an employee who has been convicted of theft to adhere to industry compliance
44
False acceptance
45
Simulation
46
NDA
47
Staging
48
Detective
49
Verifying that system patching has effectively removed knows vulnerabilities
50
Create a user account to maintain persistence
51
No patches are available for the web browser
52
An orchestration solution that can adjust scalability of cloud assets
53
Enable an option in the administration center so accounts can be locked if they are accessed from different geographical areas
54
A jump server
55
curl --head http://192.168.0.10
56
NIST 800-53
57
An insider threat
58
False positive
59
Data exfiltration
60
Use static code analysis
61
Hoaxes
62
Nmap
63
Implement a network-wide scan for other instances of the malware.
64
TOTP
65
BIA
66
MTBF
67
laC
68
Creating a playbook within the SOAR
69
Reconnaissance
70
Differential
71
MAC cloning
72
SSO
73
Use containerization to segment the application from other applications to eliminate the risk
74
NIST Risk Management Framework
75
User behavior analytics
76
A SIEM
77
Cross-site scripting
78
Insider threat
79
Perform containment on the critical servers and resources
80
Dark web
81
Directory traversal: implement a WAF
82
Preventive
83
Privileged access management
84
Configure the guest wireless network to be on a separate VLAN from the company's intenal wireless network
85
High data entropy
86
Transit gateway
87
SIEM correlation dashboards
88
Deploying a captive portal to capture visitors' MAC addresses and names
89
MOU
90
DPO
91
RAID
92
NIPS, WAF
93
EAP-FAST
94
Low FRR
95
Context-aware authentication
96
DLP
97
USB data blocker
98
Geographic dispersal
99
VDI
100
EDR
security+1
security+1
lopkeda · 100問 · 2年前security+1
security+1
100問 • 2年前security+2
security+2
lopkeda · 100問 · 2年前security+2
security+2
100問 • 2年前security+7
security+7
lopkeda · 100問 · 2年前security+7
security+7
100問 • 2年前security+8
security+8
lopkeda · 100問 · 2年前security+8
security+8
100問 • 2年前security+9
security+9
lopkeda · 100問 · 2年前security+9
security+9
100問 • 2年前security+10
security+10
lopkeda · 100問 · 2年前security+10
security+10
100問 • 2年前security+11
security+11
lopkeda · 100問 · 2年前security+11
security+11
100問 • 2年前security+12
security+12
lopkeda · 64問 · 2年前security+12
security+12
64問 • 2年前cysa+1
cysa+1
lopkeda · 100問 · 2年前cysa+1
cysa+1
100問 • 2年前cysa+2
cysa+2
lopkeda · 100問 · 2年前cysa+2
cysa+2
100問 • 2年前cysa+3
cysa+3
lopkeda · 54問 · 1年前cysa+3
cysa+3
54問 • 1年前A+1
A+1
lopkeda · 100問 · 1年前A+1
A+1
100問 • 1年前問題一覧
1
MSSP
2
Hybrid environment
3
Impersonation
4
The key length of the encryption algorithm
5
AES
6
An attacker is utilizing a brute-force attack against the account.
7
CYOD
8
Access control vestibule
9
Staging
10
Dumpster diving
11
Inspect the file metadata.
12
Encrypt the disk on the storage device.
13
DNS logs
14
Evil twin
15
Hashing
16
Legal hold
17
An alarm
18
Firewall rules
19
Wireshark
20
Community
21
Enforce the use of a controlled trusted source of container images
22
Use a captive portal for user authentication., Authenticate users using OAuth for more resiliency
23
Implement S/MIME to encrypt the emails at rest
24
SOAR
25
TAXII
26
Patch each running container individually and test the application
27
Logic bomb
28
Next-generation SWG
29
Rogue access point
30
- access-rule permit tcp destination 172.16.1.5 port 80 -access-rule permit tcp destination 172.16.1.5 port 443 -access-rule deny top destination 172.16.1.5 port 21
31
Homomorphic
32
Data custodian
33
Lock accounts after five failed logons
34
RAT
35
DNS poisoning
36
Smart card
37
Utilize a WAF
38
OWASP
39
Transference
40
DNS sinkhole
41
Put the machine in containment
42
MAC flooding
43
Hiring an employee who has been convicted of theft to adhere to industry compliance
44
False acceptance
45
Simulation
46
NDA
47
Staging
48
Detective
49
Verifying that system patching has effectively removed knows vulnerabilities
50
Create a user account to maintain persistence
51
No patches are available for the web browser
52
An orchestration solution that can adjust scalability of cloud assets
53
Enable an option in the administration center so accounts can be locked if they are accessed from different geographical areas
54
A jump server
55
curl --head http://192.168.0.10
56
NIST 800-53
57
An insider threat
58
False positive
59
Data exfiltration
60
Use static code analysis
61
Hoaxes
62
Nmap
63
Implement a network-wide scan for other instances of the malware.
64
TOTP
65
BIA
66
MTBF
67
laC
68
Creating a playbook within the SOAR
69
Reconnaissance
70
Differential
71
MAC cloning
72
SSO
73
Use containerization to segment the application from other applications to eliminate the risk
74
NIST Risk Management Framework
75
User behavior analytics
76
A SIEM
77
Cross-site scripting
78
Insider threat
79
Perform containment on the critical servers and resources
80
Dark web
81
Directory traversal: implement a WAF
82
Preventive
83
Privileged access management
84
Configure the guest wireless network to be on a separate VLAN from the company's intenal wireless network
85
High data entropy
86
Transit gateway
87
SIEM correlation dashboards
88
Deploying a captive portal to capture visitors' MAC addresses and names
89
MOU
90
DPO
91
RAID
92
NIPS, WAF
93
EAP-FAST
94
Low FRR
95
Context-aware authentication
96
DLP
97
USB data blocker
98
Geographic dispersal
99
VDI
100
EDR