20 Mayis -175-
問題一覧
1
Infrastructure as code
2
A. Analysis
3
C. Masking
4
Rescan the network.
5
A. Zero Trust
6
C. Impersonation, E. Smishing
7
A. OCSP
8
D. Change management procedure
9
B. Firmware
10
C. Safety controls should fail open.
11
A. If a security incident occurs on the device, the correct employee can be notified., F. Company data can be accounted for when the employee leaves the organization.
12
B. Containers
13
A. Honey pot
14
Access control lists
15
Compensating control
16
IPS
17
A. Preparation
18
B. Add a smishing exercise to the annual company training., Issue a general email warning to the company
19
C. Geolocation policy
20
D. Security of architecture
21
A. Firmware version
22
C. Organized crime
23
D. Dashboard
24
B. Setting up a VPN and placing the jump server inside the firewall
25
D. Query the file's metadata.
26
D. DLP
27
IPS
28
D. User provisioning script
29
A. Ease of recovery, D. Responsiveness
30
A. Secured zones
31
C. An attacker is attempting to brute force Smith's account.
32
C. Watering-hole
33
Insider threat
34
B. SLA
35
C. Hardening
36
D. Enabling full packet capture for traffic entering and exiting the servers
37
D. Peer review and approval
38
C. ARO
39
D. SLA
40
A. Brute-force attack
41
A. An employee receives a gift card request in an email that has an executive's name in the display field of the email.
42
C. Input validation
43
C. Subject
44
D. Removable devices
45
B. Performing code signing on company-developed software
46
B. Detective
47
C. Supply chain vendor
48
A. Serverless framework
49
A. Federation, C. Password complexity
50
A. Ease of recovery, D. Responsiveness
51
C. Create a change control request.
52
It is a false positive.
53
D. Threat hunting
54
B. Retain any communications related to the security breach until further notice
55
B. Jump server
56
Certification
57
D. FIM
58
A. SSO
59
C. IPSec
60
A. Deploying a SASE solution to remote employees
61
B. Geographic dispersion
62
A. Implementing a bastion host
63
Badge access, Access control vestibule
64
B. Disabling access
65
C. Impersonating
66
A. Host-based firewall
67
Phishing
68
Availability
69
B. http://
70
C. Password, authentication token, thumbprint
71
C. Sensitive
72
A. Multi Factor authentication
73
D. Steganography
74
D. Organized crime
75
D. Red
76
A. Local data protection regulations
77
C. Segmentation
78
D. Least privilege
79
E. The device's encryption level cannot meet organizational standards., F. The device is unable to receive authorized updates.
80
D. SOW
81
. DRP
82
B. Wired
83
D. Web-based administration
84
C. Threat vectors based on the industry in which the organization operates, E. Cadence (speed) and duration of training events
85
CVSS
86
B. Non-repudiation
87
C. Jailbreaking
88
D. Endpoint
89
A. Secured zones
90
access-list inbound deny ip source 10.1.4.9/32 destination 0.0.0.0/0
91
B. Confidential, F. Restricted
92
A. SIEM
93
A. Shadow IT
94
Detective
95
D. Updating the categorization in the content filter
96
SQL injection
97
A. Password spraying
98
Audit findings
99
A. Patch availability
100
A. Capacity planning
CNL_CH_1
CNL_CH_1
Son Cagrı · 3回閲覧 · 185問 · 2年前CNL_CH_1
CNL_CH_1
3回閲覧 • 185問 • 2年前CNL_CH_2
CNL_CH_2
Son Cagrı · 109問 · 2年前CNL_CH_2
CNL_CH_2
109問 • 2年前CNL_CH_3
CNL_CH_3
Son Cagrı · 90問 · 2年前CNL_CH_3
CNL_CH_3
90問 • 2年前CNL_CH_4
CNL_CH_4
Son Cagrı · 48問 · 2年前CNL_CH_4
CNL_CH_4
48問 • 2年前CNL_CH_5
CNL_CH_5
Son Cagrı · 83問 · 2年前CNL_CH_5
CNL_CH_5
83問 • 2年前CNL_CH_6
CNL_CH_6
Son Cagrı · 100問 · 2年前CNL_CH_6
CNL_CH_6
100問 • 2年前CNL_CH_7
CNL_CH_7
Son Cagrı · 43問 · 2年前CNL_CH_7
CNL_CH_7
43問 • 2年前CNL_CH_8
CNL_CH_8
Son Cagrı · 66問 · 2年前CNL_CH_8
CNL_CH_8
66問 • 2年前CNL_CH_9
CNL_CH_9
Son Cagrı · 49問 · 2年前CNL_CH_9
CNL_CH_9
49問 • 2年前CNL_CH_10
CNL_CH_10
Son Cagrı · 75問 · 2年前CNL_CH_10
CNL_CH_10
75問 • 2年前CNL_CH_11
CNL_CH_11
Son Cagrı · 118問 · 2年前CNL_CH_11
CNL_CH_11
118問 • 2年前CNL_CH_12
CNL_CH_12
Son Cagrı · 124問 · 2年前CNL_CH_12
CNL_CH_12
124問 • 2年前CNL_CH_13
CNL_CH_13
Son Cagrı · 95問 · 2年前CNL_CH_13
CNL_CH_13
95問 • 2年前21 Mayis
21 Mayis
Son Cagrı · 69問 · 1年前21 Mayis
21 Mayis
69問 • 1年前30 Mayis
30 Mayis
Son Cagrı · 209問 · 1年前30 Mayis
30 Mayis
209問 • 1年前A-1
A-1
Son Cagrı · 216問 · 1年前A-1
A-1
216問 • 1年前A-2
A-2
Son Cagrı · 184問 · 1年前A-2
A-2
184問 • 1年前A-3
A-3
Son Cagrı · 68問 · 1年前A-3
A-3
68問 • 1年前exam topics
exam topics
Son Cagrı · 306問 · 1年前exam topics
exam topics
306問 • 1年前pass4future
pass4future
Son Cagrı · 330問 · 1年前pass4future
pass4future
330問 • 1年前son 1
son 1
Son Cagrı · 349問 · 1年前son 1
son 1
349問 • 1年前son 2
son 2
Son Cagrı · 113問 · 1年前son 2
son 2
113問 • 1年前son 3
son 3
Son Cagrı · 63問 · 1年前son 3
son 3
63問 • 1年前問題一覧
1
Infrastructure as code
2
A. Analysis
3
C. Masking
4
Rescan the network.
5
A. Zero Trust
6
C. Impersonation, E. Smishing
7
A. OCSP
8
D. Change management procedure
9
B. Firmware
10
C. Safety controls should fail open.
11
A. If a security incident occurs on the device, the correct employee can be notified., F. Company data can be accounted for when the employee leaves the organization.
12
B. Containers
13
A. Honey pot
14
Access control lists
15
Compensating control
16
IPS
17
A. Preparation
18
B. Add a smishing exercise to the annual company training., Issue a general email warning to the company
19
C. Geolocation policy
20
D. Security of architecture
21
A. Firmware version
22
C. Organized crime
23
D. Dashboard
24
B. Setting up a VPN and placing the jump server inside the firewall
25
D. Query the file's metadata.
26
D. DLP
27
IPS
28
D. User provisioning script
29
A. Ease of recovery, D. Responsiveness
30
A. Secured zones
31
C. An attacker is attempting to brute force Smith's account.
32
C. Watering-hole
33
Insider threat
34
B. SLA
35
C. Hardening
36
D. Enabling full packet capture for traffic entering and exiting the servers
37
D. Peer review and approval
38
C. ARO
39
D. SLA
40
A. Brute-force attack
41
A. An employee receives a gift card request in an email that has an executive's name in the display field of the email.
42
C. Input validation
43
C. Subject
44
D. Removable devices
45
B. Performing code signing on company-developed software
46
B. Detective
47
C. Supply chain vendor
48
A. Serverless framework
49
A. Federation, C. Password complexity
50
A. Ease of recovery, D. Responsiveness
51
C. Create a change control request.
52
It is a false positive.
53
D. Threat hunting
54
B. Retain any communications related to the security breach until further notice
55
B. Jump server
56
Certification
57
D. FIM
58
A. SSO
59
C. IPSec
60
A. Deploying a SASE solution to remote employees
61
B. Geographic dispersion
62
A. Implementing a bastion host
63
Badge access, Access control vestibule
64
B. Disabling access
65
C. Impersonating
66
A. Host-based firewall
67
Phishing
68
Availability
69
B. http://
70
C. Password, authentication token, thumbprint
71
C. Sensitive
72
A. Multi Factor authentication
73
D. Steganography
74
D. Organized crime
75
D. Red
76
A. Local data protection regulations
77
C. Segmentation
78
D. Least privilege
79
E. The device's encryption level cannot meet organizational standards., F. The device is unable to receive authorized updates.
80
D. SOW
81
. DRP
82
B. Wired
83
D. Web-based administration
84
C. Threat vectors based on the industry in which the organization operates, E. Cadence (speed) and duration of training events
85
CVSS
86
B. Non-repudiation
87
C. Jailbreaking
88
D. Endpoint
89
A. Secured zones
90
access-list inbound deny ip source 10.1.4.9/32 destination 0.0.0.0/0
91
B. Confidential, F. Restricted
92
A. SIEM
93
A. Shadow IT
94
Detective
95
D. Updating the categorization in the content filter
96
SQL injection
97
A. Password spraying
98
Audit findings
99
A. Patch availability
100
A. Capacity planning