問題一覧
1
- Pacu
2
- Impact
3
- No ports should be open.
4
- A printer
5
- The server was patched.
6
- Telnet to the port.
7
- Query DNS and WHOlS to find her organization's registered hosts.
8
- Scans from location C will show fewer open ports.
9
- Location B
10
- Zone transfer
11
- A WHOIS query
12
- Wireshark
13
- How fast the scan runs
14
- It is scanning a CDN-hosted copy of the site.
15
- Encryption and physical accessibility
16
- Follow the service provider's scan policies.
17
- nmap -sU -p 9100,515,631 10.0.10.15/22 -0X printers.txt
18
- SSH, SMTP, DNS, LDAP
19
- A load balancer
20
- Changing packet header flags
21
- None of the above.
22
- Identify, implement, and document compensating controls.
23
- A scan of all hosts that respond to ping in the 192.168.2.0 to 192.168.2.255 network range
24
- Perform a scan from on-site.
25
- Disable promiscuous mode for NICs.
26
- Frank cannot scan multiple ports with a single ssh command.
27
- Directory traversal attacks
28
- Spoofing the destination address
29
- Agent-based scanning
30
- Replace the expired SSL certificate.
31
- Ensure that the ICS is on an isolated network.
32
- This is a moderate vulnerability that can be scheduled for remediation at a convenient time.
33
- High Severity Report
34
- PCI DSS
35
- SSH
36
- Request a scan of the test environment to confirm that the issue is corrected.
37
- 23
38
- Windows
39
- RDP
40
- None of the above
41
- Hypervisor
42
- Apply Window security patches.
43
- Credit card information
44
- Stella should make this vulnerability one of her highest priorities.
45
- Windows
46
- Apply one or more application patches.
47
- SCADA
48
- Update the vulnerability signatures.
49
- The result is a false positive.
50
- To the virtualized system
51
- Increasing the sensitivity of scans
52
- Max simultaneous checks per host
53
- Investigate the contents of the cookie.
54
- Types of information processed
55
- Agent-based scanning
56
- Database service
57
- Install a network IPS in front of the server.
58
- No action is required.
59
- Web application
60
- HTTPS
61
- Apply a security patch.
62
- Administrative control of the server
63
- Ted should perform only internal vulnerability scans.
64
- Task 1
65
- Severity 5 vulnerability in the web server
66
- No action is necessary because this is an informational report.
67
- Windows
68
- SQL injection
69
- IPsec
70
- No action is required.
71
- Time synchronization
72
- Aaron does not need to assign any priority to remediating this vulnerability.
73
- CGI generic SQL injection
74
- O.
75
- The scanner's maintenance subscription is expired.
76
- A network IPS is blocking some requests to the web server.
77
- It affects kernel-mode drivers.
78
- Carl should upgrade OpenSSL.
79
- During the evening when operations are minimal to reduce the impact on systems
80
- Upgrade to SNMP v3.
81
- Glenda should configure all workstations to automatically upgrade Chrome.
82
- Glenda should remediate this vulnerability urgently but does not need to drop everything.
83
- 1521
84
- Critical, high, and medium vulnerabilities
85
- Image files
86
- Standard Scan
87
- OpenSSL version.
88
- Banner grabbing
89
- Vulnerability 3.
90
- All of these are appropriate.
91
- Database vulnerability scan
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- Pacu
2
- Impact
3
- No ports should be open.
4
- A printer
5
- The server was patched.
6
- Telnet to the port.
7
- Query DNS and WHOlS to find her organization's registered hosts.
8
- Scans from location C will show fewer open ports.
9
- Location B
10
- Zone transfer
11
- A WHOIS query
12
- Wireshark
13
- How fast the scan runs
14
- It is scanning a CDN-hosted copy of the site.
15
- Encryption and physical accessibility
16
- Follow the service provider's scan policies.
17
- nmap -sU -p 9100,515,631 10.0.10.15/22 -0X printers.txt
18
- SSH, SMTP, DNS, LDAP
19
- A load balancer
20
- Changing packet header flags
21
- None of the above.
22
- Identify, implement, and document compensating controls.
23
- A scan of all hosts that respond to ping in the 192.168.2.0 to 192.168.2.255 network range
24
- Perform a scan from on-site.
25
- Disable promiscuous mode for NICs.
26
- Frank cannot scan multiple ports with a single ssh command.
27
- Directory traversal attacks
28
- Spoofing the destination address
29
- Agent-based scanning
30
- Replace the expired SSL certificate.
31
- Ensure that the ICS is on an isolated network.
32
- This is a moderate vulnerability that can be scheduled for remediation at a convenient time.
33
- High Severity Report
34
- PCI DSS
35
- SSH
36
- Request a scan of the test environment to confirm that the issue is corrected.
37
- 23
38
- Windows
39
- RDP
40
- None of the above
41
- Hypervisor
42
- Apply Window security patches.
43
- Credit card information
44
- Stella should make this vulnerability one of her highest priorities.
45
- Windows
46
- Apply one or more application patches.
47
- SCADA
48
- Update the vulnerability signatures.
49
- The result is a false positive.
50
- To the virtualized system
51
- Increasing the sensitivity of scans
52
- Max simultaneous checks per host
53
- Investigate the contents of the cookie.
54
- Types of information processed
55
- Agent-based scanning
56
- Database service
57
- Install a network IPS in front of the server.
58
- No action is required.
59
- Web application
60
- HTTPS
61
- Apply a security patch.
62
- Administrative control of the server
63
- Ted should perform only internal vulnerability scans.
64
- Task 1
65
- Severity 5 vulnerability in the web server
66
- No action is necessary because this is an informational report.
67
- Windows
68
- SQL injection
69
- IPsec
70
- No action is required.
71
- Time synchronization
72
- Aaron does not need to assign any priority to remediating this vulnerability.
73
- CGI generic SQL injection
74
- O.
75
- The scanner's maintenance subscription is expired.
76
- A network IPS is blocking some requests to the web server.
77
- It affects kernel-mode drivers.
78
- Carl should upgrade OpenSSL.
79
- During the evening when operations are minimal to reduce the impact on systems
80
- Upgrade to SNMP v3.
81
- Glenda should configure all workstations to automatically upgrade Chrome.
82
- Glenda should remediate this vulnerability urgently but does not need to drop everything.
83
- 1521
84
- Critical, high, and medium vulnerabilities
85
- Image files
86
- Standard Scan
87
- OpenSSL version.
88
- Banner grabbing
89
- Vulnerability 3.
90
- All of these are appropriate.
91
- Database vulnerability scan