問題一覧
1
- Stress testing
2
- Regression testing
3
- Fuzz testing
4
- Agile
5
- Static code analyzer
6
- Unvalidated input
7
- Design
8
- Disposition
9
- Static analysis
10
- Dynamic analysis
11
- Fuzzing
12
- $
13
- Obscure web interface locations.
14
- Implement logging and intrusion detection.
15
- MAC address
16
- Waterfall
17
- A WAF
18
- They can use alternate encodings.
19
- A web proxy
20
- Cross-site scripting
21
- Firmware protection
22
- Automating some security gates
23
- Output encoding
24
- To prevent brute-forcing
25
- Login failed; invalid user ID or password
26
- Parameterized queries
27
- Compare a hash of the file to a hash provided by the manufacturer.
28
- SQL injection
29
- XSS
30
- Agile
31
- Spiral
32
- Disposition
33
- Session IDs could be decoded, resulting in data leakage.
34
- Input validation
35
- She is checking for all U.S. state name abbreviations.
36
- A fuzzer
37
- Output validation
38
- SQL injection
39
- Feasibility
40
- Coding
41
- Training and transition
42
- ASLR and DEP
43
- Move to a NAT environment.
44
- Session hijacking
45
- Identify, implement, and document compensating controls.
46
- Implement logging.
47
- A SQL injection attack
48
- WAF
49
- Printers, move the printers to an internal-only IP address range
50
- Attack vectors
51
- They will have to ensure the scanner works with all of the languages chosen.
52
- Threat
53
- Network segmentation
54
- Probability and magnitude
55
- Preventive
56
- Impersonation
57
- Risk mitigation
58
- Risk avoidance
59
- Risk transference
60
- Risk avoidance
61
- Minimizing the amount of data retained and the number of places where it is stored
62
- Have a discussion with his manager.
63
- 50 percent
64
- .005
65
- $25,000
66
- Risk avoidance
67
- Risk transference
68
- Risk acceptance
69
- Mandatory vacations
70
- Separation of duties violation
71
- Document the decision.
72
- Combination of quantitative and qualitative risk assessment
73
- Red team
74
- Automated deprovisioning
75
- Annually
76
- Risk identification
77
- Data retention
78
- Corrective
79
- Dual control
80
- Rules of engagement
81
- Procedure
82
- Succession planning
83
- Corrective
84
- Code of conduct
85
- Proposed revision to the security policy
86
- Account management policy
87
- Separation of duties
88
- Two-person control
89
- Background investigations
90
- White team
91
- Dual control
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- Stress testing
2
- Regression testing
3
- Fuzz testing
4
- Agile
5
- Static code analyzer
6
- Unvalidated input
7
- Design
8
- Disposition
9
- Static analysis
10
- Dynamic analysis
11
- Fuzzing
12
- $
13
- Obscure web interface locations.
14
- Implement logging and intrusion detection.
15
- MAC address
16
- Waterfall
17
- A WAF
18
- They can use alternate encodings.
19
- A web proxy
20
- Cross-site scripting
21
- Firmware protection
22
- Automating some security gates
23
- Output encoding
24
- To prevent brute-forcing
25
- Login failed; invalid user ID or password
26
- Parameterized queries
27
- Compare a hash of the file to a hash provided by the manufacturer.
28
- SQL injection
29
- XSS
30
- Agile
31
- Spiral
32
- Disposition
33
- Session IDs could be decoded, resulting in data leakage.
34
- Input validation
35
- She is checking for all U.S. state name abbreviations.
36
- A fuzzer
37
- Output validation
38
- SQL injection
39
- Feasibility
40
- Coding
41
- Training and transition
42
- ASLR and DEP
43
- Move to a NAT environment.
44
- Session hijacking
45
- Identify, implement, and document compensating controls.
46
- Implement logging.
47
- A SQL injection attack
48
- WAF
49
- Printers, move the printers to an internal-only IP address range
50
- Attack vectors
51
- They will have to ensure the scanner works with all of the languages chosen.
52
- Threat
53
- Network segmentation
54
- Probability and magnitude
55
- Preventive
56
- Impersonation
57
- Risk mitigation
58
- Risk avoidance
59
- Risk transference
60
- Risk avoidance
61
- Minimizing the amount of data retained and the number of places where it is stored
62
- Have a discussion with his manager.
63
- 50 percent
64
- .005
65
- $25,000
66
- Risk avoidance
67
- Risk transference
68
- Risk acceptance
69
- Mandatory vacations
70
- Separation of duties violation
71
- Document the decision.
72
- Combination of quantitative and qualitative risk assessment
73
- Red team
74
- Automated deprovisioning
75
- Annually
76
- Risk identification
77
- Data retention
78
- Corrective
79
- Dual control
80
- Rules of engagement
81
- Procedure
82
- Succession planning
83
- Corrective
84
- Code of conduct
85
- Proposed revision to the security policy
86
- Account management policy
87
- Separation of duties
88
- Two-person control
89
- Background investigations
90
- White team
91
- Dual control