ID: C2 Deep Pt.4
問題一覧
1
code injection technique used to attack data-driven applications. Malicious injection statements are inserted into an entry field for execution, such as dumping the database contents to the attacker.
2
attack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other.
3
Type of cyber attack carried out over a Local Area Network (LAN) that involves sending malicious ARP packets to a default gateway on a LAN to change the pairings in its IP to MAC address table.
4
type of injection in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in a browser side script, to a different end-user.
5
SQL Injection
6
On-Path Attack (formerly known as a man-in-the-middle attack)
7
ARP Poisoning, also known as ARP Spoofing
8
Cross-Site Scripting (XSS) attacks
9
The dd command
10
The mv command
11
The Is command
12
The cd command
13
allows a technician to see information and modify the configuration settings of the network adapters in the workstation. It is used to connect to a network using broadband, dial-up, or VPN connection, or add/remove file and printer sharing over the network on the workstation.
14
A Public Network
15
A Private Network
16
detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting, and blocking sensitive data while in use (endpoint actions), in-motion (network traffic), and at rest (data storage).
17
The Network and Sharing Center in the Control Panel
18
A Public Network
19
A Private Network
20
Data Loss Prevention Software
21
System Configuration
22
Performance Monitor
23
Resource Monitor
24
System information
25
system utility to troubleshoot the Microsoft Windows startup processes. This configuration is used to disable or re-enable software, device drivers, and Windows services that run at startup, or to change boot parameters.
26
Monitoring system that monitors utility in Windows that is used to monitor the activities on CPU and memory activity on a computer.
27
a utility used to display information about the use of hardware (CPU, memory, disk, and network) and software (file handles and modules) resources in real-time.
28
System Configuration (msconfig.exe)
29
Performance Monitor (perfmon.msc)
30
Resource Monitor (resmon.exe)
31
System information (msinfo32.exe)
32
Rivest Cipher 4
33
works by overloading a server with multiple requests (more than it can handle), thus eventually knocking the server offline.
34
sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs, or laptop computers, sending a vCard which typically contains a message in the name field to another Bluetooth-enabled device via the OBEX protocol.
35
form of stream cipher. It encrypts messages one byte at a time via an algorithm. Plenty of stream ciphers exist, but this cipher is among the most popular. It's simple to apply, and it works quickly, even on very large pieces of data.
36
symmetric block cipher chosen by the U.S. government to protect classified information. This cipher is implemented in software and hardware throughout the world to encrypt sensitive data. It is essential for government computer security, cybersecurity and electronic data protection.
37
DoS Attack or Denial-Of-Service Attack
38
Bluejacking
39
RC4 (also known as Rivest Cipher 4)
40
Advanced Encryption Standard (AES)
41
a security protocol used in the IEEE 802.11 wireless networking standard. It was designed to provide more secure encryption than the earlier Wired Equivalent Privacy (WEP), without needing to replace existing hardware.
42
advanced Encryption Standard
43
Batch Script
44
scripts that run on the Windows operating system and, in their simplest form, contain a list of several commands that are executed in a sequence. You can run the file by calling its name from the command line or double-clicking the file in File Explorer.
45
an easy-to-use command-line text editor for Linux systems.This editor includes the functionality of a regular text editor, as well as syntax highlighting, multiple buffers, search and replace with regular expression support, spellchecking, UTF-8 encoding, and more.
46
used by Linux computers to enable the sharing and access of resources with Windows-based networks. This can also be used by Linux servers to provide file-sharing services to Windows clients.
47
a well-supported and will be regularly updated by the Linux distribution to support new hardware, performance, and security improvements. These releases are supported for a long time (approximately 10 years), so they are great to use in production systems like servers.
48
a prerelease of a software product that is given out to a large group of users to try under real conditions. These releases have gone through alpha testing in-house and are generally fairly close in look, feel and function to the final product.
49
a pre-release of a software product that is given out to software developers to test and modify their existing products to the upcoming version of an operating system or application.
50
a concept in software development where an application is frequently updated through the release of new features over time.
51
Long Term Support
52
one primary backup and two copies of the data, save the backups to two different types of media,, keep at least one backup copy off-site
53
Carriage Return Line Feed
54
HTTP response splitting attack
55
a type of cyber threat that manipulates the carriage return and line feed special characters found within a web application's HTTP header.
56
File Transfer Protocol FTP
57
Secure Shell SSH
58
Telnet
59
Simple Mail Transfer Protocol SMTP
60
Domain Name System DNS
61
Dynamic Host Configuration Protocol DHCP
62
Hypertext Transfer Protocol HTTP
63
Post Office Protocol 3 POP3
64
Network Basic Input Output System NetBIOS / NetBIOS over TCPIP NetBT
65
Internet Mail Access Protocol IMAP
66
Simple Network Management Protocol SNMP
67
Lightweight Directory Access Protocol LDAP
68
Hypertext Transfer Protocol Secure HTTPS
69
Server Message Block SMB / Common Internet File System CIFS
70
Remote Desktop Protocol RDP
71
20 21
72
22
73
23
74
25
75
53
76
67 68
77
80
78
110
79
137 139
80
143
81
161 162
82
389
83
443
84
445
85
3389
DION#1
DION#1
Mixtapes øf Hanna · 90問 · 1年前DION#1
DION#1
90問 • 1年前DION#2
DION#2
Mixtapes øf Hanna · 90問 · 1年前DION#2
DION#2
90問 • 1年前DION#3
DION#3
Mixtapes øf Hanna · 90問 · 1年前DION#3
DION#3
90問 • 1年前DION#4
DION#4
Mixtapes øf Hanna · 90問 · 1年前DION#4
DION#4
90問 • 1年前DION#5
DION#5
Mixtapes øf Hanna · 89問 · 1年前DION#5
DION#5
89問 • 1年前DION#6
DION#6
Mixtapes øf Hanna · 87問 · 1年前DION#6
DION#6
87問 • 1年前ID: PT.1 COLLABORATE
ID: PT.1 COLLABORATE
Mixtapes øf Hanna · 95問 · 1年前ID: PT.1 COLLABORATE
ID: PT.1 COLLABORATE
95問 • 1年前ID: C2 Deep Pt.1
ID: C2 Deep Pt.1
Mixtapes øf Hanna · 90問 · 1年前ID: C2 Deep Pt.1
ID: C2 Deep Pt.1
90問 • 1年前ID: C2 Deep Pt.2
ID: C2 Deep Pt.2
Mixtapes øf Hanna · 98問 · 1年前ID: C2 Deep Pt.2
ID: C2 Deep Pt.2
98問 • 1年前ID: C2 Deep Pt.3
ID: C2 Deep Pt.3
Mixtapes øf Hanna · 93問 · 1年前ID: C2 Deep Pt.3
ID: C2 Deep Pt.3
93問 • 1年前OL BOYS STUDY GUIDE
OL BOYS STUDY GUIDE
Mixtapes øf Hanna · 70問 · 1年前OL BOYS STUDY GUIDE
OL BOYS STUDY GUIDE
70問 • 1年前MASTER REVIEW
MASTER REVIEW
Mixtapes øf Hanna · 44問 · 1年前MASTER REVIEW
MASTER REVIEW
44問 • 1年前EC: C2 Deep PT.1
EC: C2 Deep PT.1
Mixtapes øf Hanna · 96問 · 1年前EC: C2 Deep PT.1
EC: C2 Deep PT.1
96問 • 1年前EC: C2 Deep PT.2
EC: C2 Deep PT.2
Mixtapes øf Hanna · 89問 · 1年前EC: C2 Deep PT.2
EC: C2 Deep PT.2
89問 • 1年前EC: C2 Deep Pt.3
EC: C2 Deep Pt.3
Mixtapes øf Hanna · 94問 · 1年前EC: C2 Deep Pt.3
EC: C2 Deep Pt.3
94問 • 1年前EC: C2 Deep Pt.4
EC: C2 Deep Pt.4
Mixtapes øf Hanna · 91問 · 1年前EC: C2 Deep Pt.4
EC: C2 Deep Pt.4
91問 • 1年前EC: C2 Deep Pt.5
EC: C2 Deep Pt.5
Mixtapes øf Hanna · 88問 · 1年前EC: C2 Deep Pt.5
EC: C2 Deep Pt.5
88問 • 1年前問題一覧
1
code injection technique used to attack data-driven applications. Malicious injection statements are inserted into an entry field for execution, such as dumping the database contents to the attacker.
2
attack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other.
3
Type of cyber attack carried out over a Local Area Network (LAN) that involves sending malicious ARP packets to a default gateway on a LAN to change the pairings in its IP to MAC address table.
4
type of injection in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in a browser side script, to a different end-user.
5
SQL Injection
6
On-Path Attack (formerly known as a man-in-the-middle attack)
7
ARP Poisoning, also known as ARP Spoofing
8
Cross-Site Scripting (XSS) attacks
9
The dd command
10
The mv command
11
The Is command
12
The cd command
13
allows a technician to see information and modify the configuration settings of the network adapters in the workstation. It is used to connect to a network using broadband, dial-up, or VPN connection, or add/remove file and printer sharing over the network on the workstation.
14
A Public Network
15
A Private Network
16
detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting, and blocking sensitive data while in use (endpoint actions), in-motion (network traffic), and at rest (data storage).
17
The Network and Sharing Center in the Control Panel
18
A Public Network
19
A Private Network
20
Data Loss Prevention Software
21
System Configuration
22
Performance Monitor
23
Resource Monitor
24
System information
25
system utility to troubleshoot the Microsoft Windows startup processes. This configuration is used to disable or re-enable software, device drivers, and Windows services that run at startup, or to change boot parameters.
26
Monitoring system that monitors utility in Windows that is used to monitor the activities on CPU and memory activity on a computer.
27
a utility used to display information about the use of hardware (CPU, memory, disk, and network) and software (file handles and modules) resources in real-time.
28
System Configuration (msconfig.exe)
29
Performance Monitor (perfmon.msc)
30
Resource Monitor (resmon.exe)
31
System information (msinfo32.exe)
32
Rivest Cipher 4
33
works by overloading a server with multiple requests (more than it can handle), thus eventually knocking the server offline.
34
sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs, or laptop computers, sending a vCard which typically contains a message in the name field to another Bluetooth-enabled device via the OBEX protocol.
35
form of stream cipher. It encrypts messages one byte at a time via an algorithm. Plenty of stream ciphers exist, but this cipher is among the most popular. It's simple to apply, and it works quickly, even on very large pieces of data.
36
symmetric block cipher chosen by the U.S. government to protect classified information. This cipher is implemented in software and hardware throughout the world to encrypt sensitive data. It is essential for government computer security, cybersecurity and electronic data protection.
37
DoS Attack or Denial-Of-Service Attack
38
Bluejacking
39
RC4 (also known as Rivest Cipher 4)
40
Advanced Encryption Standard (AES)
41
a security protocol used in the IEEE 802.11 wireless networking standard. It was designed to provide more secure encryption than the earlier Wired Equivalent Privacy (WEP), without needing to replace existing hardware.
42
advanced Encryption Standard
43
Batch Script
44
scripts that run on the Windows operating system and, in their simplest form, contain a list of several commands that are executed in a sequence. You can run the file by calling its name from the command line or double-clicking the file in File Explorer.
45
an easy-to-use command-line text editor for Linux systems.This editor includes the functionality of a regular text editor, as well as syntax highlighting, multiple buffers, search and replace with regular expression support, spellchecking, UTF-8 encoding, and more.
46
used by Linux computers to enable the sharing and access of resources with Windows-based networks. This can also be used by Linux servers to provide file-sharing services to Windows clients.
47
a well-supported and will be regularly updated by the Linux distribution to support new hardware, performance, and security improvements. These releases are supported for a long time (approximately 10 years), so they are great to use in production systems like servers.
48
a prerelease of a software product that is given out to a large group of users to try under real conditions. These releases have gone through alpha testing in-house and are generally fairly close in look, feel and function to the final product.
49
a pre-release of a software product that is given out to software developers to test and modify their existing products to the upcoming version of an operating system or application.
50
a concept in software development where an application is frequently updated through the release of new features over time.
51
Long Term Support
52
one primary backup and two copies of the data, save the backups to two different types of media,, keep at least one backup copy off-site
53
Carriage Return Line Feed
54
HTTP response splitting attack
55
a type of cyber threat that manipulates the carriage return and line feed special characters found within a web application's HTTP header.
56
File Transfer Protocol FTP
57
Secure Shell SSH
58
Telnet
59
Simple Mail Transfer Protocol SMTP
60
Domain Name System DNS
61
Dynamic Host Configuration Protocol DHCP
62
Hypertext Transfer Protocol HTTP
63
Post Office Protocol 3 POP3
64
Network Basic Input Output System NetBIOS / NetBIOS over TCPIP NetBT
65
Internet Mail Access Protocol IMAP
66
Simple Network Management Protocol SNMP
67
Lightweight Directory Access Protocol LDAP
68
Hypertext Transfer Protocol Secure HTTPS
69
Server Message Block SMB / Common Internet File System CIFS
70
Remote Desktop Protocol RDP
71
20 21
72
22
73
23
74
25
75
53
76
67 68
77
80
78
110
79
137 139
80
143
81
161 162
82
389
83
443
84
445
85
3389