security+1
問題一覧
1
gait, facial
2
MSSP
3
DNS cache poisoning
4
Conducting a tabletop exercise
5
Enforce application whitelisting
6
Cross-site request forgery
7
Detective
8
SLA
9
CASB
10
Containerization
11
Nmap
12
Blocking removable-media devices and write capabilities using a host-based security tool
13
Obfuscation
14
Encrypted credentials in transit
15
Transference
16
Data exfiltration over a mobile hotspot
17
Threat hunting
18
Perfect forward secrecy
19
GDPR
20
Shadow IT
21
Anonymize any PII that is observed within the loC data.
22
A RAT was installed and is transferring additional exploit tools
23
Disaster recovery
24
To identify the risk, the risk owner, and the risk measures
25
DoS, Race condition
26
PCI DSS
27
Zero-day
28
Whaling
29
Fingerprints
30
Chain of custody
31
Wildcard
32
Implement managed FDE
33
Evil Twin
34
The DNS logs
35
Configure the perimeter firewall to deny inbound external connections to SMB ports
36
Phishing
37
Shadow IT
38
An air gap
39
Mandatory
40
Seperation of duties
41
Footprinting
42
Weak encryption, Server-side request forgery
43
Containerization
44
Implement application whitelisting and centralized event-log management, and perform regular testing and validation of full backups
45
Perform a site survey, Create a heat map
46
dd
47
SSAE SOC 2
48
Extract mail exchanger records in the DNS
49
Value and volatility of data, Right-to-audit clauses
50
Containment
51
The scan enumerated software versions of installed programs
52
The data owner is responsible for determining how the data may be used, while the data custodian is responsible for implementing the protection to the data
53
Installed a captive portal
54
SED
55
An injection attack is being conducted against a user authentication system
56
A company purchased an IPS system, but after reviewing the requirements, the appliance was supposed to monitor, not block, any traffic
57
Submit the application to QA before releasing it
58
SAML
59
Pagefile
60
Due to foreign travel, the user's laptop was isolated from the network.
61
A privileged access management system
62
A worm that has propagated itself across the intranet, which was initiated by presentation media
63
The vulnerability scan output
64
Configure the DLP policies to whitelist this application with the specific PlI
65
The vendor has not supplied a patch for the appliance
66
The SSL inspection proxy is feeding events to a compromised SIEM
67
Spraying
68
IaaS
69
Dual power supply, Off-site backups
70
Man-in-the-middle
71
Resources exhaustion
72
Certain devices are inherently less secure than others, so compensatory controls will be needed to address the delta between device vendors.
73
A VPN, A host-based firewall
74
Push notifications
75
Segment the network with firewalls.
76
Mobile device management
77
Continuous integration
78
6
79
The document is a honeyfile and is meant to attract the attention of a cyberintruder.
80
Install the public key on the server, Encrypt the private key
81
Trojan
82
Host the web server in a DMZ and the file servers behind a firewall
83
VM escape
84
Deterrent
85
DDoS
86
13
87
RAID 1
88
Air gap
89
To protect sites on web servers that are publicly accessible
90
is automatically established between parent and a child
91
Change the default SSH port. enable TCP tunneling. and provide a pre-configured SSH client.
92
Privilege escalation
93
Screen filters
94
Implement a host-based firewall rule to block future events of this type from occurring.
95
3DES, RC4
96
Foundational
97
Faraday cage
98
Notoriety
99
pivoting
100
Some advanced users are jailbreaking the OS and bypassing the controls. Implement an MDM solution to control access to company resources.
security+2
security+2
lopkeda · 100問 · 2年前security+2
security+2
100問 • 2年前security+6
security+6
lopkeda · 100問 · 2年前security+6
security+6
100問 • 2年前security+7
security+7
lopkeda · 100問 · 2年前security+7
security+7
100問 • 2年前security+8
security+8
lopkeda · 100問 · 2年前security+8
security+8
100問 • 2年前security+9
security+9
lopkeda · 100問 · 2年前security+9
security+9
100問 • 2年前security+10
security+10
lopkeda · 100問 · 2年前security+10
security+10
100問 • 2年前security+11
security+11
lopkeda · 100問 · 2年前security+11
security+11
100問 • 2年前security+12
security+12
lopkeda · 64問 · 2年前security+12
security+12
64問 • 2年前cysa+1
cysa+1
lopkeda · 100問 · 2年前cysa+1
cysa+1
100問 • 2年前cysa+2
cysa+2
lopkeda · 100問 · 2年前cysa+2
cysa+2
100問 • 2年前cysa+3
cysa+3
lopkeda · 54問 · 1年前cysa+3
cysa+3
54問 • 1年前A+1
A+1
lopkeda · 100問 · 1年前A+1
A+1
100問 • 1年前問題一覧
1
gait, facial
2
MSSP
3
DNS cache poisoning
4
Conducting a tabletop exercise
5
Enforce application whitelisting
6
Cross-site request forgery
7
Detective
8
SLA
9
CASB
10
Containerization
11
Nmap
12
Blocking removable-media devices and write capabilities using a host-based security tool
13
Obfuscation
14
Encrypted credentials in transit
15
Transference
16
Data exfiltration over a mobile hotspot
17
Threat hunting
18
Perfect forward secrecy
19
GDPR
20
Shadow IT
21
Anonymize any PII that is observed within the loC data.
22
A RAT was installed and is transferring additional exploit tools
23
Disaster recovery
24
To identify the risk, the risk owner, and the risk measures
25
DoS, Race condition
26
PCI DSS
27
Zero-day
28
Whaling
29
Fingerprints
30
Chain of custody
31
Wildcard
32
Implement managed FDE
33
Evil Twin
34
The DNS logs
35
Configure the perimeter firewall to deny inbound external connections to SMB ports
36
Phishing
37
Shadow IT
38
An air gap
39
Mandatory
40
Seperation of duties
41
Footprinting
42
Weak encryption, Server-side request forgery
43
Containerization
44
Implement application whitelisting and centralized event-log management, and perform regular testing and validation of full backups
45
Perform a site survey, Create a heat map
46
dd
47
SSAE SOC 2
48
Extract mail exchanger records in the DNS
49
Value and volatility of data, Right-to-audit clauses
50
Containment
51
The scan enumerated software versions of installed programs
52
The data owner is responsible for determining how the data may be used, while the data custodian is responsible for implementing the protection to the data
53
Installed a captive portal
54
SED
55
An injection attack is being conducted against a user authentication system
56
A company purchased an IPS system, but after reviewing the requirements, the appliance was supposed to monitor, not block, any traffic
57
Submit the application to QA before releasing it
58
SAML
59
Pagefile
60
Due to foreign travel, the user's laptop was isolated from the network.
61
A privileged access management system
62
A worm that has propagated itself across the intranet, which was initiated by presentation media
63
The vulnerability scan output
64
Configure the DLP policies to whitelist this application with the specific PlI
65
The vendor has not supplied a patch for the appliance
66
The SSL inspection proxy is feeding events to a compromised SIEM
67
Spraying
68
IaaS
69
Dual power supply, Off-site backups
70
Man-in-the-middle
71
Resources exhaustion
72
Certain devices are inherently less secure than others, so compensatory controls will be needed to address the delta between device vendors.
73
A VPN, A host-based firewall
74
Push notifications
75
Segment the network with firewalls.
76
Mobile device management
77
Continuous integration
78
6
79
The document is a honeyfile and is meant to attract the attention of a cyberintruder.
80
Install the public key on the server, Encrypt the private key
81
Trojan
82
Host the web server in a DMZ and the file servers behind a firewall
83
VM escape
84
Deterrent
85
DDoS
86
13
87
RAID 1
88
Air gap
89
To protect sites on web servers that are publicly accessible
90
is automatically established between parent and a child
91
Change the default SSH port. enable TCP tunneling. and provide a pre-configured SSH client.
92
Privilege escalation
93
Screen filters
94
Implement a host-based firewall rule to block future events of this type from occurring.
95
3DES, RC4
96
Foundational
97
Faraday cage
98
Notoriety
99
pivoting
100
Some advanced users are jailbreaking the OS and bypassing the controls. Implement an MDM solution to control access to company resources.