son 2
問題一覧
1
A. Implement a SIEM to correlate logs from multiple sources looking for alterable incidents.
2
A. OWASP
3
A. SSH
4
FTP is an insecure protocol and should not be used.
5
A. Multi Factor authentication
6
A. WAF
7
C. Salting
8
B. Implementing mandatory vacations
9
C. Inform the vendor of this discovery in a secure manner and apply appropriate mitigations
10
C. Supply chain attack
11
A. NIDS
12
B. Whaling
13
C. Standard naming conventions
14
A. It occurs during litigation and requires retention of both electronic and physical documents.
15
C. Preventing unauthenticated clients access to the server
16
B. Account audits
17
C. Cloud
18
B. Spear phishing
19
C. Data masking
20
E. Evil twin
21
Perform nightly snapshots.
22
A. A successful privilege escalation attack by a local user
23
B. Smart card
24
D. Directory traversal
25
D. EAP-TLS
26
D. Operational
27
D. On-path attack
28
B. Disable unnecessary services.
29
C. Destruction, E. Sanitization
30
D. HVAC
31
D. Continuity of operations plan
32
B. Snapshot
33
A. Remote wipe, G. Containerization
34
A. Perform an offline brute-force attack.
35
A. Full
36
C. Retention policy
37
B. Syslog data
38
A. CASB
39
C. Unblock the OCSP protocol in the host-based firewall.
40
A. Heat map
41
C. Asymmetric encryption
42
A. Lack of security updates
43
A. APT groups
44
A. Token key
45
A. Script kiddie
46
Security group
47
B. SOC 2 Type II
48
A. Isolate the controller from the rest of the network and constrain connectivity.
49
D. Integrity
50
B. Honeypot
51
A. PIN
52
To ensure only authorized users have the ability to obtain direct access to systems or data
53
C. Receiving a push notification to a mobile application
54
B. RAM
55
D. Segregation of duties
56
D. Data blockers
57
C. Recurring
58
C. A DNS sinkhole can be used to capture traffic to known-malicious domains used by attackers.
59
B. Spraying
60
Non-repudiation
61
A. chmod
62
A. Full device encryption
63
B. Containment
64
B. White-box
65
B. Completing the upgrade process immediately on all devices
66
A. Provisioning
67
A. Geofencing alerts
68
D. UPS
69
C. LDAPS
70
Limit the scope of the penetration test to only the system that is used for teller workstations
71
C. Unskilled attacker
72
C. Incorporating the principle of data minimization throughout business processes
73
A. laaS
74
B. laaS
75
A. Weak encryption
76
A. Hoaxes
77
B. CSA (Cloud Security Alliance)
78
B. IP-based firewall rules
79
A. Disk encryption
80
D. CRL
81
B. Proof of PCI DSS compliance
82
A. A brute-force attack occurred.
83
C. Risk matrix
84
D. There is a single point of failure.
85
D. Infrastructure as code
86
B. Dead code
87
Residual
88
D. Server-side validation
89
C. ARP poisoning
90
C. Fileless malware execution
91
C. GET https://comptia.org/../../../etc/passwd HTTP/1.1 200
92
C. Confidentiality
93
B. Full weekly and incremental daily
94
A. A user performed a MAC cloning attack with a personal device.
95
C. Honeypots, E. DNS sinkhole
96
D. TPM
97
A. Unnecessary open ports
98
C. Conduct a site survey.
99
C. Add a guest captive portal requiring visitors to accept terms and conditions.
100
C. Sandboxing
CNL_CH_1
CNL_CH_1
Son Cagrı · 3回閲覧 · 185問 · 2年前CNL_CH_1
CNL_CH_1
3回閲覧 • 185問 • 2年前CNL_CH_2
CNL_CH_2
Son Cagrı · 109問 · 2年前CNL_CH_2
CNL_CH_2
109問 • 2年前CNL_CH_3
CNL_CH_3
Son Cagrı · 90問 · 2年前CNL_CH_3
CNL_CH_3
90問 • 2年前CNL_CH_4
CNL_CH_4
Son Cagrı · 48問 · 2年前CNL_CH_4
CNL_CH_4
48問 • 2年前CNL_CH_5
CNL_CH_5
Son Cagrı · 83問 · 2年前CNL_CH_5
CNL_CH_5
83問 • 2年前CNL_CH_6
CNL_CH_6
Son Cagrı · 100問 · 2年前CNL_CH_6
CNL_CH_6
100問 • 2年前CNL_CH_7
CNL_CH_7
Son Cagrı · 43問 · 2年前CNL_CH_7
CNL_CH_7
43問 • 2年前CNL_CH_8
CNL_CH_8
Son Cagrı · 66問 · 2年前CNL_CH_8
CNL_CH_8
66問 • 2年前CNL_CH_9
CNL_CH_9
Son Cagrı · 49問 · 2年前CNL_CH_9
CNL_CH_9
49問 • 2年前CNL_CH_10
CNL_CH_10
Son Cagrı · 75問 · 2年前CNL_CH_10
CNL_CH_10
75問 • 2年前CNL_CH_11
CNL_CH_11
Son Cagrı · 118問 · 2年前CNL_CH_11
CNL_CH_11
118問 • 2年前CNL_CH_12
CNL_CH_12
Son Cagrı · 124問 · 2年前CNL_CH_12
CNL_CH_12
124問 • 2年前CNL_CH_13
CNL_CH_13
Son Cagrı · 95問 · 2年前CNL_CH_13
CNL_CH_13
95問 • 2年前21 Mayis
21 Mayis
Son Cagrı · 69問 · 1年前21 Mayis
21 Mayis
69問 • 1年前20 Mayis -175-
20 Mayis -175-
Son Cagrı · 174問 · 1年前20 Mayis -175-
20 Mayis -175-
174問 • 1年前30 Mayis
30 Mayis
Son Cagrı · 209問 · 1年前30 Mayis
30 Mayis
209問 • 1年前A-1
A-1
Son Cagrı · 216問 · 1年前A-1
A-1
216問 • 1年前A-2
A-2
Son Cagrı · 184問 · 1年前A-2
A-2
184問 • 1年前A-3
A-3
Son Cagrı · 68問 · 1年前A-3
A-3
68問 • 1年前exam topics
exam topics
Son Cagrı · 306問 · 1年前exam topics
exam topics
306問 • 1年前pass4future
pass4future
Son Cagrı · 330問 · 1年前pass4future
pass4future
330問 • 1年前son 1
son 1
Son Cagrı · 349問 · 1年前son 1
son 1
349問 • 1年前son 3
son 3
Son Cagrı · 63問 · 1年前son 3
son 3
63問 • 1年前問題一覧
1
A. Implement a SIEM to correlate logs from multiple sources looking for alterable incidents.
2
A. OWASP
3
A. SSH
4
FTP is an insecure protocol and should not be used.
5
A. Multi Factor authentication
6
A. WAF
7
C. Salting
8
B. Implementing mandatory vacations
9
C. Inform the vendor of this discovery in a secure manner and apply appropriate mitigations
10
C. Supply chain attack
11
A. NIDS
12
B. Whaling
13
C. Standard naming conventions
14
A. It occurs during litigation and requires retention of both electronic and physical documents.
15
C. Preventing unauthenticated clients access to the server
16
B. Account audits
17
C. Cloud
18
B. Spear phishing
19
C. Data masking
20
E. Evil twin
21
Perform nightly snapshots.
22
A. A successful privilege escalation attack by a local user
23
B. Smart card
24
D. Directory traversal
25
D. EAP-TLS
26
D. Operational
27
D. On-path attack
28
B. Disable unnecessary services.
29
C. Destruction, E. Sanitization
30
D. HVAC
31
D. Continuity of operations plan
32
B. Snapshot
33
A. Remote wipe, G. Containerization
34
A. Perform an offline brute-force attack.
35
A. Full
36
C. Retention policy
37
B. Syslog data
38
A. CASB
39
C. Unblock the OCSP protocol in the host-based firewall.
40
A. Heat map
41
C. Asymmetric encryption
42
A. Lack of security updates
43
A. APT groups
44
A. Token key
45
A. Script kiddie
46
Security group
47
B. SOC 2 Type II
48
A. Isolate the controller from the rest of the network and constrain connectivity.
49
D. Integrity
50
B. Honeypot
51
A. PIN
52
To ensure only authorized users have the ability to obtain direct access to systems or data
53
C. Receiving a push notification to a mobile application
54
B. RAM
55
D. Segregation of duties
56
D. Data blockers
57
C. Recurring
58
C. A DNS sinkhole can be used to capture traffic to known-malicious domains used by attackers.
59
B. Spraying
60
Non-repudiation
61
A. chmod
62
A. Full device encryption
63
B. Containment
64
B. White-box
65
B. Completing the upgrade process immediately on all devices
66
A. Provisioning
67
A. Geofencing alerts
68
D. UPS
69
C. LDAPS
70
Limit the scope of the penetration test to only the system that is used for teller workstations
71
C. Unskilled attacker
72
C. Incorporating the principle of data minimization throughout business processes
73
A. laaS
74
B. laaS
75
A. Weak encryption
76
A. Hoaxes
77
B. CSA (Cloud Security Alliance)
78
B. IP-based firewall rules
79
A. Disk encryption
80
D. CRL
81
B. Proof of PCI DSS compliance
82
A. A brute-force attack occurred.
83
C. Risk matrix
84
D. There is a single point of failure.
85
D. Infrastructure as code
86
B. Dead code
87
Residual
88
D. Server-side validation
89
C. ARP poisoning
90
C. Fileless malware execution
91
C. GET https://comptia.org/../../../etc/passwd HTTP/1.1 200
92
C. Confidentiality
93
B. Full weekly and incremental daily
94
A. A user performed a MAC cloning attack with a personal device.
95
C. Honeypots, E. DNS sinkhole
96
D. TPM
97
A. Unnecessary open ports
98
C. Conduct a site survey.
99
C. Add a guest captive portal requiring visitors to accept terms and conditions.
100
C. Sandboxing