security+7
問題一覧
1
internet proxy
2
WPA2-Enterprise
3
Pass-the-hash
4
Netstat
5
Agile
6
On-path attack
7
Tabletop exercise
8
SaaS
9
A forward proxy server
10
WAP placement
11
Implement proper network access restrictions
12
FAR
13
Malicious script
14
Staging
15
Service
16
Generate a list of domains similar to the company's own and implement a DNS sinkhole for each.
17
Log analysis
18
CASB
19
Assess existing vulnerabilities affecting the third-parry code and the remediation efficiency of the libraries' developers.
20
Keylogger
21
To avoid data leakage
22
Revoke the code-signing certificate.
23
DNS Poisoning
24
Lessons learned
25
Utilizing SIEM correlation engines
26
DLP
27
Direct access
28
SLA
29
DNS poisoning
30
Ram, Cache
31
Snapshot
32
A SOC 2 Type 2 report
33
The dark web
34
Missing patches for third-party software on Windows workstations and servers.
35
Password history
36
pivoting
37
Activate runbooks for incident response
38
Check the hash of the installation file
39
SSH
40
HIDS
41
Vishing, Credential harvesting
42
Smishing
43
nmap -p 80 10.10.10.0/24
44
Fencing
45
Hybrid
46
Implement input validation
47
Place the unauthorized application in a blocklist.
48
The business continuity plan
49
Logic Bomb
50
the sender's private key and decrypted with the sender's public key.
51
write down the phone number of the caller if possible, the name of the person requesting the information. Hang-up, and notify the organizations cybersecurity officer
52
Macro-enabled file
53
implementing a GPO that will restrict access to authorized USB removable media and regularly verifying that it is enforced
54
implement a SOAR with customizable playbooks
55
SQLi attack
56
purchasing insurance
57
MFA
58
user certificate
59
the chain of custody form did not note time zone offsets between transportation regions
60
SIEM
61
GDPR compliance attestation
62
Black-box
63
SQLİ
64
DDoS attack
65
It identifies the amount of allowable downtime for an application or system,
66
WAP placement
67
it incorporates control development, policy, and management activities into IT operations
68
HTTP security header
69
Provide a domain parameter to theharvester tool
70
SLA
71
password complexity
72
data at rest
73
Intimidation
74
block access to application stores
75
employees of other companies and the press
76
SSH
77
it examines and documents how well the team responded, discovers what caused the incident, and determines how the incident can be avoided in the future
78
perform a physical-to-virtual migration
79
Host-based firewall
80
SaaS
81
Detective
82
Tokenization
83
Command injection and irectory traversal attempts
84
Train the team to identify the difference between events and incidents
85
VDI
86
CASB
87
An HVAC system
88
A zero-day exploit is initially undetectable and no patch for it exists
89
Logic bomb
90
ARO
91
Non-repudiation
92
Preventive
93
Federation
94
Take a memory snapshot of the running system.
95
D
96
Password history
97
DNS poisoning
98
Conduct a site survey.
99
USB data blocker
100
WAF
security+1
security+1
lopkeda · 100問 · 2年前security+1
security+1
100問 • 2年前security+2
security+2
lopkeda · 100問 · 2年前security+2
security+2
100問 • 2年前security+6
security+6
lopkeda · 100問 · 2年前security+6
security+6
100問 • 2年前security+8
security+8
lopkeda · 100問 · 2年前security+8
security+8
100問 • 2年前security+9
security+9
lopkeda · 100問 · 2年前security+9
security+9
100問 • 2年前security+10
security+10
lopkeda · 100問 · 2年前security+10
security+10
100問 • 2年前security+11
security+11
lopkeda · 100問 · 2年前security+11
security+11
100問 • 2年前security+12
security+12
lopkeda · 64問 · 2年前security+12
security+12
64問 • 2年前cysa+1
cysa+1
lopkeda · 100問 · 2年前cysa+1
cysa+1
100問 • 2年前cysa+2
cysa+2
lopkeda · 100問 · 2年前cysa+2
cysa+2
100問 • 2年前cysa+3
cysa+3
lopkeda · 54問 · 1年前cysa+3
cysa+3
54問 • 1年前A+1
A+1
lopkeda · 100問 · 1年前A+1
A+1
100問 • 1年前問題一覧
1
internet proxy
2
WPA2-Enterprise
3
Pass-the-hash
4
Netstat
5
Agile
6
On-path attack
7
Tabletop exercise
8
SaaS
9
A forward proxy server
10
WAP placement
11
Implement proper network access restrictions
12
FAR
13
Malicious script
14
Staging
15
Service
16
Generate a list of domains similar to the company's own and implement a DNS sinkhole for each.
17
Log analysis
18
CASB
19
Assess existing vulnerabilities affecting the third-parry code and the remediation efficiency of the libraries' developers.
20
Keylogger
21
To avoid data leakage
22
Revoke the code-signing certificate.
23
DNS Poisoning
24
Lessons learned
25
Utilizing SIEM correlation engines
26
DLP
27
Direct access
28
SLA
29
DNS poisoning
30
Ram, Cache
31
Snapshot
32
A SOC 2 Type 2 report
33
The dark web
34
Missing patches for third-party software on Windows workstations and servers.
35
Password history
36
pivoting
37
Activate runbooks for incident response
38
Check the hash of the installation file
39
SSH
40
HIDS
41
Vishing, Credential harvesting
42
Smishing
43
nmap -p 80 10.10.10.0/24
44
Fencing
45
Hybrid
46
Implement input validation
47
Place the unauthorized application in a blocklist.
48
The business continuity plan
49
Logic Bomb
50
the sender's private key and decrypted with the sender's public key.
51
write down the phone number of the caller if possible, the name of the person requesting the information. Hang-up, and notify the organizations cybersecurity officer
52
Macro-enabled file
53
implementing a GPO that will restrict access to authorized USB removable media and regularly verifying that it is enforced
54
implement a SOAR with customizable playbooks
55
SQLi attack
56
purchasing insurance
57
MFA
58
user certificate
59
the chain of custody form did not note time zone offsets between transportation regions
60
SIEM
61
GDPR compliance attestation
62
Black-box
63
SQLİ
64
DDoS attack
65
It identifies the amount of allowable downtime for an application or system,
66
WAP placement
67
it incorporates control development, policy, and management activities into IT operations
68
HTTP security header
69
Provide a domain parameter to theharvester tool
70
SLA
71
password complexity
72
data at rest
73
Intimidation
74
block access to application stores
75
employees of other companies and the press
76
SSH
77
it examines and documents how well the team responded, discovers what caused the incident, and determines how the incident can be avoided in the future
78
perform a physical-to-virtual migration
79
Host-based firewall
80
SaaS
81
Detective
82
Tokenization
83
Command injection and irectory traversal attempts
84
Train the team to identify the difference between events and incidents
85
VDI
86
CASB
87
An HVAC system
88
A zero-day exploit is initially undetectable and no patch for it exists
89
Logic bomb
90
ARO
91
Non-repudiation
92
Preventive
93
Federation
94
Take a memory snapshot of the running system.
95
D
96
Password history
97
DNS poisoning
98
Conduct a site survey.
99
USB data blocker
100
WAF