問題一覧
1
- A link failure
2
- Systems involved in the incident
3
- Signature-based attack detection methods
4
- Event logs
5
- Wireless authentication logs
6
- Live image to an external drive.
7
- Nmap cannot tell whether the port is open or closed.
8
- Neither host B nor host A are synchronized to NTP properly.
9
- Server D
10
- High
11
- Hank should consider the request and work with networking and engineering teams on possible implementation.
12
- Availability
13
- Technical Report
14
- He should perform additional diagnostics to determine the cause of the latency.
15
- SYN-based port scanning
16
- bs
17
- It provides information about the techniques attackers are using.
18
- An APT
19
- Time to resolve critical vulnerabilities
20
- There are no TCP services reachable on Nap's default 1000 TCP ports.
21
- All of the above
22
- Validate the BIOS hash against a known good version.
23
- She can export and view the GIF.
24
- Cyber Kill Chain
25
- nmap -p 1-65535 -sV -sS
26
- Saas
27
- Dan should take no action.
28
- Firewall logs
29
- Uncredentialed external scan
30
- Zero-write the drive.
31
- Detection and analysis
32
- Firewalling
33
- Isolation
34
- $HOME/.bash history
35
- Risk mitigation
36
- Task 3
37
- Session hijacking
38
- The registry
39
- Order of volatility
40
- Creating a playbook
41
- Move from TLS 1.0 to TLS 1.3.
42
- Honeypot data
43
- Open redirect
44
- To scan for vulnerabilities
45
- Rich should work with the team to find a mutually acceptable solution.
46
- The result is a false positive.
47
- None of the above
48
- Removal
49
- She should deploy the patch in a sandbox environment to test it prior to applying it in production.
50
- The scan was run from a different network perspective than user traffic.
51
- map -PO -sS -TO 10.0.10.0/24
52
- Reducing the attack surface
53
- Operating system installed on systems
54
- Severity 5 vulnerability in the file server
55
- Policy
56
- Mateo should provide the administrators with access.
57
- Adjust directory permissions.
58
- An event
59
- An intrusion prevention system is blocking access to the server.
60
- The factors used are both the same type of factor, making the control less effective.
61
- All of the above
62
- Application or token-based multifactor authentication
63
- The files do not match.
64
- Identity provider
65
- Something she knows and something she has.
66
- Knowledge factor
67
- Performing user input validation
68
- Services may be crashed by the scanner
69
- A password spraying attack
70
- Inform the media immediately of developments in the investigation.
71
- Static analvsis
72
- A directory traversal attack
73
- Parameterized queries
74
- Identify the problems and events that occurred.
75
- Reducing the attack surface areas
76
- CVSS score
77
- Mean time to detect
78
- Qualitative risk assessment
79
- DKIM
80
- Compensating controls
81
- Relevancy
82
- DLP
83
- XML
84
- Legal hold
85
- Chain of custody tracking
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- A link failure
2
- Systems involved in the incident
3
- Signature-based attack detection methods
4
- Event logs
5
- Wireless authentication logs
6
- Live image to an external drive.
7
- Nmap cannot tell whether the port is open or closed.
8
- Neither host B nor host A are synchronized to NTP properly.
9
- Server D
10
- High
11
- Hank should consider the request and work with networking and engineering teams on possible implementation.
12
- Availability
13
- Technical Report
14
- He should perform additional diagnostics to determine the cause of the latency.
15
- SYN-based port scanning
16
- bs
17
- It provides information about the techniques attackers are using.
18
- An APT
19
- Time to resolve critical vulnerabilities
20
- There are no TCP services reachable on Nap's default 1000 TCP ports.
21
- All of the above
22
- Validate the BIOS hash against a known good version.
23
- She can export and view the GIF.
24
- Cyber Kill Chain
25
- nmap -p 1-65535 -sV -sS
26
- Saas
27
- Dan should take no action.
28
- Firewall logs
29
- Uncredentialed external scan
30
- Zero-write the drive.
31
- Detection and analysis
32
- Firewalling
33
- Isolation
34
- $HOME/.bash history
35
- Risk mitigation
36
- Task 3
37
- Session hijacking
38
- The registry
39
- Order of volatility
40
- Creating a playbook
41
- Move from TLS 1.0 to TLS 1.3.
42
- Honeypot data
43
- Open redirect
44
- To scan for vulnerabilities
45
- Rich should work with the team to find a mutually acceptable solution.
46
- The result is a false positive.
47
- None of the above
48
- Removal
49
- She should deploy the patch in a sandbox environment to test it prior to applying it in production.
50
- The scan was run from a different network perspective than user traffic.
51
- map -PO -sS -TO 10.0.10.0/24
52
- Reducing the attack surface
53
- Operating system installed on systems
54
- Severity 5 vulnerability in the file server
55
- Policy
56
- Mateo should provide the administrators with access.
57
- Adjust directory permissions.
58
- An event
59
- An intrusion prevention system is blocking access to the server.
60
- The factors used are both the same type of factor, making the control less effective.
61
- All of the above
62
- Application or token-based multifactor authentication
63
- The files do not match.
64
- Identity provider
65
- Something she knows and something she has.
66
- Knowledge factor
67
- Performing user input validation
68
- Services may be crashed by the scanner
69
- A password spraying attack
70
- Inform the media immediately of developments in the investigation.
71
- Static analvsis
72
- A directory traversal attack
73
- Parameterized queries
74
- Identify the problems and events that occurred.
75
- Reducing the attack surface areas
76
- CVSS score
77
- Mean time to detect
78
- Qualitative risk assessment
79
- DKIM
80
- Compensating controls
81
- Relevancy
82
- DLP
83
- XML
84
- Legal hold
85
- Chain of custody tracking