CNL_CH_11
問題一覧
1
Disabling guest accounts, Disabling NetBIOS over TCP/IP
2
SSH was turned off instead of modifying the configuration file
3
HTTPS sessions are being downgraded to insecure cipher suites
4
A SSL/TLS downgrade
5
Submit a change request to modify the XSS vulnerability signature to TCP reset on future attempts.
6
Implement input validations
7
The GPO blocking the flash drives is being bypassed by a malicious flash drive that is attempting to harvest plaintext credentials from memory.
8
Injection
9
Replay attack
10
SQLi
11
SQL injection
12
The MRI vendor does not support newer versions of the OS.
13
SSH
14
Proper error handling
15
Error handling
16
An attacker temporarily poisoned a name server
17
XSS
18
SQLI
19
Directory traversal
20
Malicious script
21
PKI., RADIUS
22
SSH
23
Configure SNMPv3.
24
HTTP security header
25
Included third-party libraries, Vendors/supply chain
26
Approved first
27
Vishing
28
Invest in secure coding training and application security guidelines.
29
Apply patches.
30
Provisioning
31
Version control
32
Buffer overflow
33
Code obfuscation
34
Typosquatting
35
Supply chain attack
36
A next-generation firewall
37
Buffer overflow
38
Generate a list of domains similar to the company's own and implement a DNS sinkhole for each.
39
DNS poisoning
40
DNS poisoning
41
DNS poisoning
42
Block SSH access from the Internet.
43
Command injection and directory traversal attempts
44
Block unneeded TCP 445 connections
45
Block port 3389 inbound from untrusted networks
46
A zero-day exploit is initially undetectable and no patch for it exists
47
Zero day
48
Place the machines with the unapproved software in containment.
49
Cross-site scripting, SQLinjection
50
http://sample.url.com/someotherpageonsite/../../../etc/shadow
51
SQLi attack
52
DNSSEC
53
Development
54
Not installing new software to prevent compatibility errors
55
Dynamic code analysis tool
56
Staging
57
Production
58
Agile
59
Assess existing vulnerabilities affecting the third-party code and the remediation efficiency of the libraries' developers.
60
Containerization
61
Version control
62
139, 445
63
Unsecure protocol (http)
64
Open ports and services
65
The vulnerability scan output
66
deep packet inspection, application awareness
67
NGFW
68
WAF
69
Implement S/MIME to encrypt the emails at rest
70
access-rule permit tcp destination 172.16.1.5 port 80 access-rule permit tcp destination 172.16.1.5 port 443 access-rule deny tcp destination 172.16.1.5 port 21
71
DNS poisoning
72
Sandboxing
73
Modify the corporate firewall rules.
74
Typosquatting
75
Smishing
76
23/tcp
77
Implement application whitelisting and centralized event-log management, and perform regular testing and validation of full backups.
78
is automatically established between a parent and a child
79
XSS attack
80
Directory traversal
81
OWASP (Open Web Application Security Project)
82
Use static code analysis
83
Normalization
84
SSL stripping
85
Input validation
86
Continuous integration
87
Directory traversal
88
CSRF
89
Ensure input validation is in place to prevent the use of invalid characters and values.
90
Session replay?
91
Directory traversal
92
Static code analysis
93
Install a sandbox to run the malicious payload in a safe environment
94
Cross site scripting
95
SQL injection on the field to bypass authentication
96
Continuous integration
97
Implement input validation
98
Cross-site scripting
99
Directory traversal: implement a WAF
100
DNS poisoning
CNL_CH_1
CNL_CH_1
Son Cagrı · 3回閲覧 · 185問 · 2年前CNL_CH_1
CNL_CH_1
3回閲覧 • 185問 • 2年前CNL_CH_2
CNL_CH_2
Son Cagrı · 109問 · 2年前CNL_CH_2
CNL_CH_2
109問 • 2年前CNL_CH_3
CNL_CH_3
Son Cagrı · 90問 · 2年前CNL_CH_3
CNL_CH_3
90問 • 2年前CNL_CH_4
CNL_CH_4
Son Cagrı · 48問 · 2年前CNL_CH_4
CNL_CH_4
48問 • 2年前CNL_CH_5
CNL_CH_5
Son Cagrı · 83問 · 2年前CNL_CH_5
CNL_CH_5
83問 • 2年前CNL_CH_6
CNL_CH_6
Son Cagrı · 100問 · 2年前CNL_CH_6
CNL_CH_6
100問 • 2年前CNL_CH_7
CNL_CH_7
Son Cagrı · 43問 · 2年前CNL_CH_7
CNL_CH_7
43問 • 2年前CNL_CH_8
CNL_CH_8
Son Cagrı · 66問 · 2年前CNL_CH_8
CNL_CH_8
66問 • 2年前CNL_CH_9
CNL_CH_9
Son Cagrı · 49問 · 2年前CNL_CH_9
CNL_CH_9
49問 • 2年前CNL_CH_10
CNL_CH_10
Son Cagrı · 75問 · 2年前CNL_CH_10
CNL_CH_10
75問 • 2年前CNL_CH_12
CNL_CH_12
Son Cagrı · 124問 · 2年前CNL_CH_12
CNL_CH_12
124問 • 2年前CNL_CH_13
CNL_CH_13
Son Cagrı · 95問 · 2年前CNL_CH_13
CNL_CH_13
95問 • 2年前21 Mayis
21 Mayis
Son Cagrı · 69問 · 1年前21 Mayis
21 Mayis
69問 • 1年前20 Mayis -175-
20 Mayis -175-
Son Cagrı · 174問 · 1年前20 Mayis -175-
20 Mayis -175-
174問 • 1年前30 Mayis
30 Mayis
Son Cagrı · 209問 · 1年前30 Mayis
30 Mayis
209問 • 1年前A-1
A-1
Son Cagrı · 216問 · 1年前A-1
A-1
216問 • 1年前A-2
A-2
Son Cagrı · 184問 · 1年前A-2
A-2
184問 • 1年前A-3
A-3
Son Cagrı · 68問 · 1年前A-3
A-3
68問 • 1年前exam topics
exam topics
Son Cagrı · 306問 · 1年前exam topics
exam topics
306問 • 1年前pass4future
pass4future
Son Cagrı · 330問 · 1年前pass4future
pass4future
330問 • 1年前son 1
son 1
Son Cagrı · 349問 · 1年前son 1
son 1
349問 • 1年前son 2
son 2
Son Cagrı · 113問 · 1年前son 2
son 2
113問 • 1年前son 3
son 3
Son Cagrı · 63問 · 1年前son 3
son 3
63問 • 1年前問題一覧
1
Disabling guest accounts, Disabling NetBIOS over TCP/IP
2
SSH was turned off instead of modifying the configuration file
3
HTTPS sessions are being downgraded to insecure cipher suites
4
A SSL/TLS downgrade
5
Submit a change request to modify the XSS vulnerability signature to TCP reset on future attempts.
6
Implement input validations
7
The GPO blocking the flash drives is being bypassed by a malicious flash drive that is attempting to harvest plaintext credentials from memory.
8
Injection
9
Replay attack
10
SQLi
11
SQL injection
12
The MRI vendor does not support newer versions of the OS.
13
SSH
14
Proper error handling
15
Error handling
16
An attacker temporarily poisoned a name server
17
XSS
18
SQLI
19
Directory traversal
20
Malicious script
21
PKI., RADIUS
22
SSH
23
Configure SNMPv3.
24
HTTP security header
25
Included third-party libraries, Vendors/supply chain
26
Approved first
27
Vishing
28
Invest in secure coding training and application security guidelines.
29
Apply patches.
30
Provisioning
31
Version control
32
Buffer overflow
33
Code obfuscation
34
Typosquatting
35
Supply chain attack
36
A next-generation firewall
37
Buffer overflow
38
Generate a list of domains similar to the company's own and implement a DNS sinkhole for each.
39
DNS poisoning
40
DNS poisoning
41
DNS poisoning
42
Block SSH access from the Internet.
43
Command injection and directory traversal attempts
44
Block unneeded TCP 445 connections
45
Block port 3389 inbound from untrusted networks
46
A zero-day exploit is initially undetectable and no patch for it exists
47
Zero day
48
Place the machines with the unapproved software in containment.
49
Cross-site scripting, SQLinjection
50
http://sample.url.com/someotherpageonsite/../../../etc/shadow
51
SQLi attack
52
DNSSEC
53
Development
54
Not installing new software to prevent compatibility errors
55
Dynamic code analysis tool
56
Staging
57
Production
58
Agile
59
Assess existing vulnerabilities affecting the third-party code and the remediation efficiency of the libraries' developers.
60
Containerization
61
Version control
62
139, 445
63
Unsecure protocol (http)
64
Open ports and services
65
The vulnerability scan output
66
deep packet inspection, application awareness
67
NGFW
68
WAF
69
Implement S/MIME to encrypt the emails at rest
70
access-rule permit tcp destination 172.16.1.5 port 80 access-rule permit tcp destination 172.16.1.5 port 443 access-rule deny tcp destination 172.16.1.5 port 21
71
DNS poisoning
72
Sandboxing
73
Modify the corporate firewall rules.
74
Typosquatting
75
Smishing
76
23/tcp
77
Implement application whitelisting and centralized event-log management, and perform regular testing and validation of full backups.
78
is automatically established between a parent and a child
79
XSS attack
80
Directory traversal
81
OWASP (Open Web Application Security Project)
82
Use static code analysis
83
Normalization
84
SSL stripping
85
Input validation
86
Continuous integration
87
Directory traversal
88
CSRF
89
Ensure input validation is in place to prevent the use of invalid characters and values.
90
Session replay?
91
Directory traversal
92
Static code analysis
93
Install a sandbox to run the malicious payload in a safe environment
94
Cross site scripting
95
SQL injection on the field to bypass authentication
96
Continuous integration
97
Implement input validation
98
Cross-site scripting
99
Directory traversal: implement a WAF
100
DNS poisoning