問題一覧
1
- Perform a DNS brute-force attack.
2
- MySQL
3
- Determine the reason for the ports being open.
4
- Malware
5
- Total attack surface
6
- A TCP SYN scan
7
- Limit information available via the organizational website without authentication.
8
- A wireless router
9
- Total loss of confidentiality, integrity, and availability
10
- Operating system and Common Platform Enumeration (CPE) data
11
- Banner grabbing
12
- A proxy scan
13
- Unprotected storage
14
- High.
15
- Persistent
16
- Broken access control
17
- Rely on vendor testing and audits.
18
- STIX
19
- Rootkit
20
- Pacu
21
- Impact
22
- No ports should be open.
23
- A printer
24
- The server was patched.
25
- Telnet to the port.
26
- Query DNS and WHOlS to find her organization's registered hosts.
27
- Scans from location C will show fewer open ports.
28
- Location B
29
- Zone transfer
30
- A WHOIS query
31
- Wireshark
32
- How fast the scan runs
33
- It is scanning a CDN-hosted copy of the site.
34
- Encryption and physical accessibility
35
- Follow the service provider's scan policies.
36
- nmap -sU -p 9100,515,631 10.0.10.15/22 -0X printers.txt
37
- SSH, SMTP, DNS, LDAP
38
- A load balancer
39
- Changing packet header flags
40
- None of the above.
41
- Identify, implement, and document compensating controls.
42
- A scan of all hosts that respond to ping in the 192.168.2.0 to 192.168.2.255 network range
43
- Perform a scan from on-site.
44
- Disable promiscuous mode for NICs.
45
- Frank cannot scan multiple ports with a single ssh command.
46
- Directory traversal attacks
47
- Spoofing the destination address
48
- Agent-based scanning
49
- Replace the expired SSL certificate.
50
- Ensure that the ICS is on an isolated network.
51
- This is a moderate vulnerability that can be scheduled for remediation at a convenient time.
52
- High Severity Report
53
- PCI DSS
54
- SSH
55
- Request a scan of the test environment to confirm that the issue is corrected.
56
- 23
57
- Windows
58
- RDP
59
- None of the above
60
- Hypervisor
61
- Apply Window security patches.
62
- Credit card information
63
- Stella should make this vulnerability one of her highest priorities.
64
- Windows
65
- Apply one or more application patches.
66
- SCADA
67
- Update the vulnerability signatures.
68
- The result is a false positive.
69
- To the virtualized system
70
- Increasing the sensitivity of scans
71
- Max simultaneous checks per host
72
- Investigate the contents of the cookie.
73
- Types of information processed
74
- Agent-based scanning
75
- Database service
76
- Install a network IPS in front of the server.
77
- No action is required.
78
- Web application
79
- HTTPS
80
- Apply a security patch.
81
- Administrative control of the server
82
- Ted should perform only internal vulnerability scans.
83
- Task 1
84
- Severity 5 vulnerability in the web server
85
- No action is necessary because this is an informational report.
86
- Windows
87
- SQL injection
88
- IPsec
89
- No action is required.
90
- Time synchronization
91
- Aaron does not need to assign any priority to remediating this vulnerability.
92
- CGI generic SQL injection
93
- O.
94
- The scanner's maintenance subscription is expired.
95
- A network IPS is blocking some requests to the web server.
96
- It affects kernel-mode drivers.
97
- Carl should upgrade OpenSSL.
98
- During the evening when operations are minimal to reduce the impact on systems
99
- Upgrade to SNMP v3.
100
- Glenda should configure all workstations to automatically upgrade Chrome.
Weekly Test 1
Weekly Test 1
ユーザ名非公開 · 50問 · 13日前Weekly Test 1
Weekly Test 1
50問 • 13日前WT 1
WT 1
ユーザ名非公開 · 50問 · 13日前WT 1
WT 1
50問 • 13日前Practical Problems and Experiences REFRESHER 1
Practical Problems and Experiences REFRESHER 1
ユーザ名非公開 · 100問 · 13日前Practical Problems and Experiences REFRESHER 1
Practical Problems and Experiences REFRESHER 1
100問 • 13日前Plumbing Arithmetic Terms 4
Plumbing Arithmetic Terms 4
ユーザ名非公開 · 27問 · 13日前Plumbing Arithmetic Terms 4
Plumbing Arithmetic Terms 4
27問 • 13日前Plumbing Arithmetic Terms 3
Plumbing Arithmetic Terms 3
ユーザ名非公開 · 49問 · 13日前Plumbing Arithmetic Terms 3
Plumbing Arithmetic Terms 3
49問 • 13日前Plumbing Arithmetic Terms 2
Plumbing Arithmetic Terms 2
ユーザ名非公開 · 47問 · 13日前Plumbing Arithmetic Terms 2
Plumbing Arithmetic Terms 2
47問 • 13日前Plumbing Arithmetic Terms 1
Plumbing Arithmetic Terms 1
ユーザ名非公開 · 49問 · 13日前Plumbing Arithmetic Terms 1
Plumbing Arithmetic Terms 1
49問 • 13日前Plumbing Tools 2
Plumbing Tools 2
ユーザ名非公開 · 53問 · 13日前Plumbing Tools 2
Plumbing Tools 2
53問 • 13日前Plumbing Tools 1
Plumbing Tools 1
ユーザ名非公開 · 87問 · 13日前Plumbing Tools 1
Plumbing Tools 1
87問 • 13日前Competence 6
Competence 6
ユーザ名非公開 · 146問 · 1ヶ月前Competence 6
Competence 6
146問 • 1ヶ月前(Finals) Professional issues in Information Technology Mocktest BSIT 505
(Finals) Professional issues in Information Technology Mocktest BSIT 505
Xai Alexandrei Delos Reyes · 27問 · 1ヶ月前(Finals) Professional issues in Information Technology Mocktest BSIT 505
(Finals) Professional issues in Information Technology Mocktest BSIT 505
27問 • 1ヶ月前(Finals) Application Development Mocktest BSIT 505
(Finals) Application Development Mocktest BSIT 505
Xai Alexandrei Delos Reyes · 62問 · 1ヶ月前(Finals) Application Development Mocktest BSIT 505
(Finals) Application Development Mocktest BSIT 505
62問 • 1ヶ月前(Finals) Event-Driven Programming Mocktest BSIT 505
(Finals) Event-Driven Programming Mocktest BSIT 505
Xai Alexandrei Delos Reyes · 65問 · 2ヶ月前(Finals) Event-Driven Programming Mocktest BSIT 505
(Finals) Event-Driven Programming Mocktest BSIT 505
65問 • 2ヶ月前Competence 6
Competence 6
Emm · 146問 · 2ヶ月前Competence 6
Competence 6
146問 • 2ヶ月前cyber crime ict
cyber crime ict
Desa Mae Santiago · 12問 · 3ヶ月前cyber crime ict
cyber crime ict
12問 • 3ヶ月前ICT web
ICT web
Desa Mae Santiago · 24問 · 3ヶ月前ICT web
ICT web
24問 • 3ヶ月前Competence 6
Competence 6
ユーザ名非公開 · 146問 · 3ヶ月前Competence 6
Competence 6
146問 • 3ヶ月前6 ) System Processes
6 ) System Processes
The R.S.S.H Delivery Company · 8問 · 3ヶ月前6 ) System Processes
6 ) System Processes
8問 • 3ヶ月前2 ) Logging Levels
2 ) Logging Levels
The R.S.S.H Delivery Company · 15問 · 3ヶ月前2 ) Logging Levels
2 ) Logging Levels
15問 • 3ヶ月前セキュリティ
セキュリティ
akari · 100問 · 4ヶ月前セキュリティ
セキュリティ
100問 • 4ヶ月前問題一覧
1
- Perform a DNS brute-force attack.
2
- MySQL
3
- Determine the reason for the ports being open.
4
- Malware
5
- Total attack surface
6
- A TCP SYN scan
7
- Limit information available via the organizational website without authentication.
8
- A wireless router
9
- Total loss of confidentiality, integrity, and availability
10
- Operating system and Common Platform Enumeration (CPE) data
11
- Banner grabbing
12
- A proxy scan
13
- Unprotected storage
14
- High.
15
- Persistent
16
- Broken access control
17
- Rely on vendor testing and audits.
18
- STIX
19
- Rootkit
20
- Pacu
21
- Impact
22
- No ports should be open.
23
- A printer
24
- The server was patched.
25
- Telnet to the port.
26
- Query DNS and WHOlS to find her organization's registered hosts.
27
- Scans from location C will show fewer open ports.
28
- Location B
29
- Zone transfer
30
- A WHOIS query
31
- Wireshark
32
- How fast the scan runs
33
- It is scanning a CDN-hosted copy of the site.
34
- Encryption and physical accessibility
35
- Follow the service provider's scan policies.
36
- nmap -sU -p 9100,515,631 10.0.10.15/22 -0X printers.txt
37
- SSH, SMTP, DNS, LDAP
38
- A load balancer
39
- Changing packet header flags
40
- None of the above.
41
- Identify, implement, and document compensating controls.
42
- A scan of all hosts that respond to ping in the 192.168.2.0 to 192.168.2.255 network range
43
- Perform a scan from on-site.
44
- Disable promiscuous mode for NICs.
45
- Frank cannot scan multiple ports with a single ssh command.
46
- Directory traversal attacks
47
- Spoofing the destination address
48
- Agent-based scanning
49
- Replace the expired SSL certificate.
50
- Ensure that the ICS is on an isolated network.
51
- This is a moderate vulnerability that can be scheduled for remediation at a convenient time.
52
- High Severity Report
53
- PCI DSS
54
- SSH
55
- Request a scan of the test environment to confirm that the issue is corrected.
56
- 23
57
- Windows
58
- RDP
59
- None of the above
60
- Hypervisor
61
- Apply Window security patches.
62
- Credit card information
63
- Stella should make this vulnerability one of her highest priorities.
64
- Windows
65
- Apply one or more application patches.
66
- SCADA
67
- Update the vulnerability signatures.
68
- The result is a false positive.
69
- To the virtualized system
70
- Increasing the sensitivity of scans
71
- Max simultaneous checks per host
72
- Investigate the contents of the cookie.
73
- Types of information processed
74
- Agent-based scanning
75
- Database service
76
- Install a network IPS in front of the server.
77
- No action is required.
78
- Web application
79
- HTTPS
80
- Apply a security patch.
81
- Administrative control of the server
82
- Ted should perform only internal vulnerability scans.
83
- Task 1
84
- Severity 5 vulnerability in the web server
85
- No action is necessary because this is an informational report.
86
- Windows
87
- SQL injection
88
- IPsec
89
- No action is required.
90
- Time synchronization
91
- Aaron does not need to assign any priority to remediating this vulnerability.
92
- CGI generic SQL injection
93
- O.
94
- The scanner's maintenance subscription is expired.
95
- A network IPS is blocking some requests to the web server.
96
- It affects kernel-mode drivers.
97
- Carl should upgrade OpenSSL.
98
- During the evening when operations are minimal to reduce the impact on systems
99
- Upgrade to SNMP v3.
100
- Glenda should configure all workstations to automatically upgrade Chrome.