問題一覧
1
- Insecure direct object reference
2
- Personalization is turned off, - Returns only files hosted at diontraining.com, - Returns only Microsoft Excel spreadsheets
3
- Advanced persistent threat (APT)
4
- A JSON excerpt that describes an APT using the Structured Threat Information eXpression (STIX) format
5
- Attack surface
6
- Ring 0
7
- Virtual hosts
8
- GPO
9
- Banner grabbing
10
- Set “RemoveServerHeader” to 1 in the URLScan.ini configuration file
11
- Items classified by the system as Low or as For Informational Purposes Only
12
- You are scanning a CDN-hosted copy of the site
13
- ScoutSuite
14
- Diamond Model of Intrusion Analysis
15
- Output encoding
16
- Cloud services
17
- Advanced Persistent Threat
18
- A buffer overflow that is known to allow remote code execution
19
- Blind SQL injection
20
- Accepting serialized objects from untrusted sources or the use of serialized non-primitive data may lead to remote code execution
21
- Conduct a data criticality and prioritization analysis
22
- Application hardening
23
- Agent-based monitoring
24
- They may now be vulnerable to a credential stuffing attack
25
- Networked printer
26
- "Time stomp" on a malware file to appear as if it is part of the operating system, - Install a webshell on a serve, - Create a point of presence by adding services, scheduled tasks, or AutoRun keys, - Install a backdoor/implant on a client victim
27
- Fuzzing
28
- LDAP
29
- Blowfish
30
- Formal methods of verification
31
- Service provider (SP)
32
- Application software security
33
- Physical hardware
34
- TPM
35
- ESTABLISHED
36
- 192.186.1.100
37
- Disable password authentication for SSH
38
- Routed traffic destined for the diontraining.com domain to the localhost
39
- The beacon's protocol
40
- SOAR
41
- The full email header from one of the spam messages
42
- Decrypting data at rest
43
- The REGEX expression to filter using "[Ss]cript" is insufficient. As an attacker could use SCRIPT or SCRipt or %53CrIPT to evaded it
44
- Behavior
45
- Implement NAC
46
- How will the appliance receive updated signatures and scanning engines?, - Do you have security personnel and procedures in place to review the output from this appliance and take action where appropriate?, - Does the new appliance provide a detailed report or alert showing why it believes an attachment is malicious?, - How will the appliance receive security patches and updates?
47
- Privilege escalation
48
- Procedures
49
- Full packet capture
50
- 1
51
- FTK Imager
52
- Boot with Safe Mode
53
- Base64
54
- Submit a prioritized list with all of the recommendations for review, procurement, and installation
55
- L3 cache
56
- Virtualization
57
- Data correlation
58
Sets the block size
59
A request to issue the command "cat /etc/passwd" occurred but additional analysis is required to verify if the file was downloaded
60
- POS malware
61
- Create a daily incremental backup to tape
62
- Notification to your credit card processor
63
- Corporate policy
64
- ftp
65
- Account management policy
66
- Passwords
67
- Mitigation
68
- To aid in effective prioritization and remediation
69
- It would give the organization an accurate measurement of current patching efficiency
70
- Risk score
71
- Cross-Site Scripting (XSS)
72
- Injection Attacks
73
- It maintains transparency and trust with customers by keeping them informed about the situation
74
- It provides a measure of the efficiency of an organization's remediation efforts
75
- Mean time to remediate
76
- In the evidence section of the incident response report
77
- Stakeholder identification and communication
78
- Mean time to respond
79
- Diamond Model of Intrusion Analysis
80
- Providing a structured approach to security testing
81
- Providing a framework for web application security testing
82
- Actions and Objectives
83
- Capability
84
- Adversary
85
- Implementing compensating controls
86
- Forensic analysis
87
- MS17-010
88
- Abnormal Account Activity
89
- Malware Download and Execution
90
- Unauthorized access to sensitive data stored in the S3 buckets
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- Insecure direct object reference
2
- Personalization is turned off, - Returns only files hosted at diontraining.com, - Returns only Microsoft Excel spreadsheets
3
- Advanced persistent threat (APT)
4
- A JSON excerpt that describes an APT using the Structured Threat Information eXpression (STIX) format
5
- Attack surface
6
- Ring 0
7
- Virtual hosts
8
- GPO
9
- Banner grabbing
10
- Set “RemoveServerHeader” to 1 in the URLScan.ini configuration file
11
- Items classified by the system as Low or as For Informational Purposes Only
12
- You are scanning a CDN-hosted copy of the site
13
- ScoutSuite
14
- Diamond Model of Intrusion Analysis
15
- Output encoding
16
- Cloud services
17
- Advanced Persistent Threat
18
- A buffer overflow that is known to allow remote code execution
19
- Blind SQL injection
20
- Accepting serialized objects from untrusted sources or the use of serialized non-primitive data may lead to remote code execution
21
- Conduct a data criticality and prioritization analysis
22
- Application hardening
23
- Agent-based monitoring
24
- They may now be vulnerable to a credential stuffing attack
25
- Networked printer
26
- "Time stomp" on a malware file to appear as if it is part of the operating system, - Install a webshell on a serve, - Create a point of presence by adding services, scheduled tasks, or AutoRun keys, - Install a backdoor/implant on a client victim
27
- Fuzzing
28
- LDAP
29
- Blowfish
30
- Formal methods of verification
31
- Service provider (SP)
32
- Application software security
33
- Physical hardware
34
- TPM
35
- ESTABLISHED
36
- 192.186.1.100
37
- Disable password authentication for SSH
38
- Routed traffic destined for the diontraining.com domain to the localhost
39
- The beacon's protocol
40
- SOAR
41
- The full email header from one of the spam messages
42
- Decrypting data at rest
43
- The REGEX expression to filter using "[Ss]cript" is insufficient. As an attacker could use SCRIPT or SCRipt or %53CrIPT to evaded it
44
- Behavior
45
- Implement NAC
46
- How will the appliance receive updated signatures and scanning engines?, - Do you have security personnel and procedures in place to review the output from this appliance and take action where appropriate?, - Does the new appliance provide a detailed report or alert showing why it believes an attachment is malicious?, - How will the appliance receive security patches and updates?
47
- Privilege escalation
48
- Procedures
49
- Full packet capture
50
- 1
51
- FTK Imager
52
- Boot with Safe Mode
53
- Base64
54
- Submit a prioritized list with all of the recommendations for review, procurement, and installation
55
- L3 cache
56
- Virtualization
57
- Data correlation
58
Sets the block size
59
A request to issue the command "cat /etc/passwd" occurred but additional analysis is required to verify if the file was downloaded
60
- POS malware
61
- Create a daily incremental backup to tape
62
- Notification to your credit card processor
63
- Corporate policy
64
- ftp
65
- Account management policy
66
- Passwords
67
- Mitigation
68
- To aid in effective prioritization and remediation
69
- It would give the organization an accurate measurement of current patching efficiency
70
- Risk score
71
- Cross-Site Scripting (XSS)
72
- Injection Attacks
73
- It maintains transparency and trust with customers by keeping them informed about the situation
74
- It provides a measure of the efficiency of an organization's remediation efforts
75
- Mean time to remediate
76
- In the evidence section of the incident response report
77
- Stakeholder identification and communication
78
- Mean time to respond
79
- Diamond Model of Intrusion Analysis
80
- Providing a structured approach to security testing
81
- Providing a framework for web application security testing
82
- Actions and Objectives
83
- Capability
84
- Adversary
85
- Implementing compensating controls
86
- Forensic analysis
87
- MS17-010
88
- Abnormal Account Activity
89
- Malware Download and Execution
90
- Unauthorized access to sensitive data stored in the S3 buckets