ID: C2 Deep Pt.1
問題一覧
1
Network Address Translation
2
a network service provided by a router or proxy server to map private local addresses to one or more publicly accessible IP addresses.
3
Universal plug-and-play
4
a protocol framework allowing network devices to autoconfigure services, such as allowing a games console to request appropriate settings from a firewall.
5
The Demilitarized Zone or DMZ
6
a portion of a private network connected to the Internet and protected against intrusion.
7
Network address translation (NAT)
8
Dynamic Host Control Protocol (DHCP)
9
Universal plug-and-play (UPnP)
10
Perimeter Network
11
a protocol used to allocate IP addresses to a host when it joins a network.
12
Acceptable Use Policy
13
Digital Rights Management
14
Digital Millennium Copyright Act
15
a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet.
16
a copyright protection technology for digital media.
17
a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization that criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works.
18
data used to identify, contact, or locate an individual. Information such as social security number (SSN), name, date of birth, email address, telephone number, street address, and biometric data is considered PII.
19
Acceptable Use Policy (AUP)
20
Digital Rights Management (DRM)
21
The Digital Millennium Copyright Act (DMCA)
22
exposes the disk to a powerful electromagnet that disrupts the magnetic pattern that stores the data on the disk surface.
23
allows the data to be restored and make the data vulnerable to exposure.
24
hard disk operation that makes recovering data from your storage devices difficult once the operation is complete.
25
operation that drills holes through the hard drive platters, making the recovery of data more difficult.
26
Degaussing
27
Standard Formatting
28
Low-level Formatting
29
Drill Formatting
30
a specific identifier that contains a value that cannot be changed within the program.
31
written into the code to help a human understand the initial programmer's logic.
32
a placeholder in a script containing a number, character, or string of characters.
33
deviates from the initial program path to some sort of logic condition, the computer repeats the task until a condition is met. Often implemented with For or While statements.
34
constant
35
comment
36
variable
37
loop
38
Service Level Agreement
39
Statement of Work, Scope of Work
40
Memorandum of Understanding
41
a contract that outlines the detailed terms under which a service is provided, including reasons the contract may be terminated.
42
a document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines.
43
a preliminary or exploratory agreement to express an intent to work together that is not legally binding and does not involve monetary exchange.
44
Service Level Agreement (SLA)
45
Statement of Work / Scope of Work (SOW)
46
Memorandum of Understanding (MOU)
47
will preserve all of the user's files and applications during the upgrade process from Windows 10 to Windows 11.
48
unattended installation
49
Repair installation
50
Registry Editor
51
allows you to view and make changes to system files and programs that you wouldn't be able to access otherwise.
52
a system utility to troubleshoot the Microsoft Windows startup processes.
53
used to connect to a remote desktop session host servers or other remote computers, edit an existing remote desktop connection (rdp) configuration file, and migrate legacy connection files that were created with the client connection manager to the newer .rap connection file type.
54
Microsoft Management Console
55
a utility that uses snap-ins for various Windows tools such as disk management, computer management, performance monitor, print management, and others to perform operations on a local or networked computer.
56
Remote Desktop Services
57
is the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities.
58
is a security framework that requires all users, whether in or outside the organization's network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.
59
is an approach to cybersecurity in which a series of defensive mechanisms are layered to protect valuable data and information.
60
Acceptable Use Policy
61
is a set of rules applied by the owner, creator, or administrator of a network, website, or service, that restrict how the network, website, or system may be used and sets guidelines as to how it should be used.
62
Least privilege
63
Zero-trust
64
Defense in Depth
65
Acceptable Use Policy (AUP)
66
the application of an access control list to a switch or access point so that only clients with approved MAC addresses connect.
67
allows a router to take requests from the Internet for a particular application and send them to a designated host on the LAN.
68
a form of protection where only the items identified specifically on the list are allowed, whereas all others are denied.
69
contains every address or port that is blocked from accessing the network.
70
MAC Filtering
71
Port Forwarding
72
Allow List
73
Blocklist
74
Concatenate
75
allows the creation of single or multiple files, view file contents, concatenate files, and redirect output in the terminal to a file.
76
is a command-line utility for searching plain-text data sets for lines that match a regular expression.
77
is used to query the domain name system (DNS) to obtain information about host addresses, mail exchanges, nameservers, and related information.
78
lists the files or directories in the current path of a Unix, Linux, or Mac operating system. When invoked without any arguments, Is lists the files in the current working directory.
79
cat command
80
grep command
81
dig command
82
Is command
83
a standalone malware computer program that replicates itself to spread to other computers.
84
malicious software designed to infect computer files or disks when it is activated.
85
type of malware that looks legitimate but can take control of your computer.
86
type of malware designed to deny access to a computer system or data until a ransom is paid.
87
Worm
88
Virus
89
Trojan
90
Ransomware
DION#1
DION#1
Mixtapes øf Hanna · 90問 · 1年前DION#1
DION#1
90問 • 1年前DION#2
DION#2
Mixtapes øf Hanna · 90問 · 1年前DION#2
DION#2
90問 • 1年前DION#3
DION#3
Mixtapes øf Hanna · 90問 · 1年前DION#3
DION#3
90問 • 1年前DION#4
DION#4
Mixtapes øf Hanna · 90問 · 1年前DION#4
DION#4
90問 • 1年前DION#5
DION#5
Mixtapes øf Hanna · 89問 · 1年前DION#5
DION#5
89問 • 1年前DION#6
DION#6
Mixtapes øf Hanna · 87問 · 1年前DION#6
DION#6
87問 • 1年前ID: PT.1 COLLABORATE
ID: PT.1 COLLABORATE
Mixtapes øf Hanna · 95問 · 1年前ID: PT.1 COLLABORATE
ID: PT.1 COLLABORATE
95問 • 1年前ID: C2 Deep Pt.2
ID: C2 Deep Pt.2
Mixtapes øf Hanna · 98問 · 1年前ID: C2 Deep Pt.2
ID: C2 Deep Pt.2
98問 • 1年前ID: C2 Deep Pt.3
ID: C2 Deep Pt.3
Mixtapes øf Hanna · 93問 · 1年前ID: C2 Deep Pt.3
ID: C2 Deep Pt.3
93問 • 1年前ID: C2 Deep Pt.4
ID: C2 Deep Pt.4
Mixtapes øf Hanna · 85問 · 1年前ID: C2 Deep Pt.4
ID: C2 Deep Pt.4
85問 • 1年前OL BOYS STUDY GUIDE
OL BOYS STUDY GUIDE
Mixtapes øf Hanna · 70問 · 1年前OL BOYS STUDY GUIDE
OL BOYS STUDY GUIDE
70問 • 1年前MASTER REVIEW
MASTER REVIEW
Mixtapes øf Hanna · 44問 · 1年前MASTER REVIEW
MASTER REVIEW
44問 • 1年前EC: C2 Deep PT.1
EC: C2 Deep PT.1
Mixtapes øf Hanna · 96問 · 1年前EC: C2 Deep PT.1
EC: C2 Deep PT.1
96問 • 1年前EC: C2 Deep PT.2
EC: C2 Deep PT.2
Mixtapes øf Hanna · 89問 · 1年前EC: C2 Deep PT.2
EC: C2 Deep PT.2
89問 • 1年前EC: C2 Deep Pt.3
EC: C2 Deep Pt.3
Mixtapes øf Hanna · 94問 · 1年前EC: C2 Deep Pt.3
EC: C2 Deep Pt.3
94問 • 1年前EC: C2 Deep Pt.4
EC: C2 Deep Pt.4
Mixtapes øf Hanna · 91問 · 1年前EC: C2 Deep Pt.4
EC: C2 Deep Pt.4
91問 • 1年前EC: C2 Deep Pt.5
EC: C2 Deep Pt.5
Mixtapes øf Hanna · 88問 · 1年前EC: C2 Deep Pt.5
EC: C2 Deep Pt.5
88問 • 1年前問題一覧
1
Network Address Translation
2
a network service provided by a router or proxy server to map private local addresses to one or more publicly accessible IP addresses.
3
Universal plug-and-play
4
a protocol framework allowing network devices to autoconfigure services, such as allowing a games console to request appropriate settings from a firewall.
5
The Demilitarized Zone or DMZ
6
a portion of a private network connected to the Internet and protected against intrusion.
7
Network address translation (NAT)
8
Dynamic Host Control Protocol (DHCP)
9
Universal plug-and-play (UPnP)
10
Perimeter Network
11
a protocol used to allocate IP addresses to a host when it joins a network.
12
Acceptable Use Policy
13
Digital Rights Management
14
Digital Millennium Copyright Act
15
a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet.
16
a copyright protection technology for digital media.
17
a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization that criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works.
18
data used to identify, contact, or locate an individual. Information such as social security number (SSN), name, date of birth, email address, telephone number, street address, and biometric data is considered PII.
19
Acceptable Use Policy (AUP)
20
Digital Rights Management (DRM)
21
The Digital Millennium Copyright Act (DMCA)
22
exposes the disk to a powerful electromagnet that disrupts the magnetic pattern that stores the data on the disk surface.
23
allows the data to be restored and make the data vulnerable to exposure.
24
hard disk operation that makes recovering data from your storage devices difficult once the operation is complete.
25
operation that drills holes through the hard drive platters, making the recovery of data more difficult.
26
Degaussing
27
Standard Formatting
28
Low-level Formatting
29
Drill Formatting
30
a specific identifier that contains a value that cannot be changed within the program.
31
written into the code to help a human understand the initial programmer's logic.
32
a placeholder in a script containing a number, character, or string of characters.
33
deviates from the initial program path to some sort of logic condition, the computer repeats the task until a condition is met. Often implemented with For or While statements.
34
constant
35
comment
36
variable
37
loop
38
Service Level Agreement
39
Statement of Work, Scope of Work
40
Memorandum of Understanding
41
a contract that outlines the detailed terms under which a service is provided, including reasons the contract may be terminated.
42
a document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines.
43
a preliminary or exploratory agreement to express an intent to work together that is not legally binding and does not involve monetary exchange.
44
Service Level Agreement (SLA)
45
Statement of Work / Scope of Work (SOW)
46
Memorandum of Understanding (MOU)
47
will preserve all of the user's files and applications during the upgrade process from Windows 10 to Windows 11.
48
unattended installation
49
Repair installation
50
Registry Editor
51
allows you to view and make changes to system files and programs that you wouldn't be able to access otherwise.
52
a system utility to troubleshoot the Microsoft Windows startup processes.
53
used to connect to a remote desktop session host servers or other remote computers, edit an existing remote desktop connection (rdp) configuration file, and migrate legacy connection files that were created with the client connection manager to the newer .rap connection file type.
54
Microsoft Management Console
55
a utility that uses snap-ins for various Windows tools such as disk management, computer management, performance monitor, print management, and others to perform operations on a local or networked computer.
56
Remote Desktop Services
57
is the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities.
58
is a security framework that requires all users, whether in or outside the organization's network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.
59
is an approach to cybersecurity in which a series of defensive mechanisms are layered to protect valuable data and information.
60
Acceptable Use Policy
61
is a set of rules applied by the owner, creator, or administrator of a network, website, or service, that restrict how the network, website, or system may be used and sets guidelines as to how it should be used.
62
Least privilege
63
Zero-trust
64
Defense in Depth
65
Acceptable Use Policy (AUP)
66
the application of an access control list to a switch or access point so that only clients with approved MAC addresses connect.
67
allows a router to take requests from the Internet for a particular application and send them to a designated host on the LAN.
68
a form of protection where only the items identified specifically on the list are allowed, whereas all others are denied.
69
contains every address or port that is blocked from accessing the network.
70
MAC Filtering
71
Port Forwarding
72
Allow List
73
Blocklist
74
Concatenate
75
allows the creation of single or multiple files, view file contents, concatenate files, and redirect output in the terminal to a file.
76
is a command-line utility for searching plain-text data sets for lines that match a regular expression.
77
is used to query the domain name system (DNS) to obtain information about host addresses, mail exchanges, nameservers, and related information.
78
lists the files or directories in the current path of a Unix, Linux, or Mac operating system. When invoked without any arguments, Is lists the files in the current working directory.
79
cat command
80
grep command
81
dig command
82
Is command
83
a standalone malware computer program that replicates itself to spread to other computers.
84
malicious software designed to infect computer files or disks when it is activated.
85
type of malware that looks legitimate but can take control of your computer.
86
type of malware designed to deny access to a computer system or data until a ransom is paid.
87
Worm
88
Virus
89
Trojan
90
Ransomware