問題一覧
1
- Open source
2
- Accuracy
3
- Nation-state
4
- ISAC
5
- Reputational
6
- FaaS
7
- Network scans
8
- 4
9
- Legal counsel
10
- Community cloud
11
- No significant issues were observed.
12
- Use full-disk encryption.
13
- Password spraying
14
- Inability to access logs
15
- They are attempting to crack hashed passwords.
16
- 714
17
- Place a network firewall between the devices and the rest of the network.
18
- Self-signed certificates will cause warnings or error messages.
19
- RIPE
20
- A vulnerability scan
21
- The red team is violating the rules of engagement.
22
- LDAPS and HTTPS
23
- Data exfiltration
24
- RDP
25
- Web servers
26
- The scan scanned only UDP ports.
27
- Wireshark
28
- A dynamic analysis sandbox
29
- OSINT searches of support forums and social engineering
30
- Low.
31
- A ping sweep
32
- It is a Windows system.
33
- Unintentional insider m
34
- It provides information about the techniques attackers are using.
35
- An active defense
36
- Sandboxing
37
- The files do not match.
38
- A jump box
39
- Static analysis
40
- A dynamic analysis sandbox tool
41
- Submit cmd.exe to VirusTotal.
42
- Network segmentation
43
- Airgapping
44
- Multifactor authentication
45
- Use full-disk encryption.
46
- Host firewall
47
- Logical segmentation
48
- Compromise of the underlying VMware host
49
- Hashing cannot identify unknown malware.
50
- Air gap
51
- Deploy multifactor authentication.
52
- Knowledge and possession
53
- VoIP hacks and SIM swapping.
54
- It allows software-defined network controllers to push changes to devices to manage the network.
55
- A honeynet
56
- Horizontal scaling
57
- Virtualization lets you run multiple operating systems on a single physical system, whereas containerization lets you run multiple applications on the same system.
58
- Run a container host for each application group and secure them based on the data they contain.
59
- Privileged accounts
60
- Multifactor authentication
61
- Single sign-on implementations
62
- Kerberos
63
- CASB
64
- TLS
65
- Web browsers will report an expired certificate to users.
66
- An active defense
67
- TLS
68
- Use TLS.
69
- Physical access m
70
- From a system on the air-gapped network
71
- Both the relying party and the identity provider
72
- Processor security extensions
73
- Reduced cost
74
- Multifactor authentication
75
- Creating a shared network
76
- Application, Control, and Infrastructure layers
77
- Automated vulnerability scanning
78
- An IDP
79
- All of the above
80
- Both A and B.
81
- Entitlement management across multiple systems
82
- SAML
83
- If the traffic is unencrypted
84
- Software-defined networking
85
- None of the above
86
- Increasing the number of systems in a network segment
87
- Containerization
88
- Send the logs to a remote server.
89
- Authman
90
- Different antimalware engines call the same malware package by different names.
91
- Performance Monitor
92
- resmon
93
- Building a similarity graph of similar functions across binaries
94
- Remote execution of code
95
- 80 and 443
96
- Availability
97
- Administrators may ignore or filter the alerts
98
- Behavior
99
- Reducing the threat attack surface area
100
- An RDP connection m
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- Open source
2
- Accuracy
3
- Nation-state
4
- ISAC
5
- Reputational
6
- FaaS
7
- Network scans
8
- 4
9
- Legal counsel
10
- Community cloud
11
- No significant issues were observed.
12
- Use full-disk encryption.
13
- Password spraying
14
- Inability to access logs
15
- They are attempting to crack hashed passwords.
16
- 714
17
- Place a network firewall between the devices and the rest of the network.
18
- Self-signed certificates will cause warnings or error messages.
19
- RIPE
20
- A vulnerability scan
21
- The red team is violating the rules of engagement.
22
- LDAPS and HTTPS
23
- Data exfiltration
24
- RDP
25
- Web servers
26
- The scan scanned only UDP ports.
27
- Wireshark
28
- A dynamic analysis sandbox
29
- OSINT searches of support forums and social engineering
30
- Low.
31
- A ping sweep
32
- It is a Windows system.
33
- Unintentional insider m
34
- It provides information about the techniques attackers are using.
35
- An active defense
36
- Sandboxing
37
- The files do not match.
38
- A jump box
39
- Static analysis
40
- A dynamic analysis sandbox tool
41
- Submit cmd.exe to VirusTotal.
42
- Network segmentation
43
- Airgapping
44
- Multifactor authentication
45
- Use full-disk encryption.
46
- Host firewall
47
- Logical segmentation
48
- Compromise of the underlying VMware host
49
- Hashing cannot identify unknown malware.
50
- Air gap
51
- Deploy multifactor authentication.
52
- Knowledge and possession
53
- VoIP hacks and SIM swapping.
54
- It allows software-defined network controllers to push changes to devices to manage the network.
55
- A honeynet
56
- Horizontal scaling
57
- Virtualization lets you run multiple operating systems on a single physical system, whereas containerization lets you run multiple applications on the same system.
58
- Run a container host for each application group and secure them based on the data they contain.
59
- Privileged accounts
60
- Multifactor authentication
61
- Single sign-on implementations
62
- Kerberos
63
- CASB
64
- TLS
65
- Web browsers will report an expired certificate to users.
66
- An active defense
67
- TLS
68
- Use TLS.
69
- Physical access m
70
- From a system on the air-gapped network
71
- Both the relying party and the identity provider
72
- Processor security extensions
73
- Reduced cost
74
- Multifactor authentication
75
- Creating a shared network
76
- Application, Control, and Infrastructure layers
77
- Automated vulnerability scanning
78
- An IDP
79
- All of the above
80
- Both A and B.
81
- Entitlement management across multiple systems
82
- SAML
83
- If the traffic is unencrypted
84
- Software-defined networking
85
- None of the above
86
- Increasing the number of systems in a network segment
87
- Containerization
88
- Send the logs to a remote server.
89
- Authman
90
- Different antimalware engines call the same malware package by different names.
91
- Performance Monitor
92
- resmon
93
- Building a similarity graph of similar functions across binaries
94
- Remote execution of code
95
- 80 and 443
96
- Availability
97
- Administrators may ignore or filter the alerts
98
- Behavior
99
- Reducing the threat attack surface area
100
- An RDP connection m