security+2
問題一覧
1
OTP token combined with password
2
Denial of service
3
AUP
4
DNS hijacking, Man-in-the-browser
5
Logic bomb
6
Dumpster diving
7
Job rotation
8
TLS1.2
9
Public SaaS
10
A digital certificate on a physical token that is unlocked with a secret passcode
11
designed to specifically mitigate risk.
12
arbitrary code execution.
13
Social engineering
14
Using a popular website login to provide access to another website
15
Honeynet
16
Some users are reusing passwords, and some of the compromised passwords are valid on multiple systems.
17
Removable media control
18
Industry information-sharing and collaboration groups
19
Use SSH keys and remove generic passwords
20
Application whitelisting
21
The cloud vendor is a new attack vector within the supply chain
22
Evil twin
23
There was malicious code on the USB drive
24
head, grep
25
Geolocation, Time-of-day restrictions
26
Classify the data
27
Data masking
28
A malicious USB was introduced by an unsuspecting employee
29
The data controller
30
Smishing
31
RAID 5
32
Fuzzing
33
MAC Flooding
34
Security information and event management
35
Updating the playbooks with better decision points
36
Load balancing, RAID
37
Containment
38
Implement BYOD for the sates department while leveraging the MDM
39
Loss of proprietary information
40
Network diagrams
41
MTRE ATT$CK
42
DLP
43
Detonate the document in an analysis sandbox
44
Split tunneling
45
EDR
46
SOAR
47
Input validation
48
Implement a hot-site failover location
49
Obfuscation
50
Document the collection and require a sign-off when possession changes.
51
Incremental backups Monday through Friday at 6:00 p.m and differential backups hourly
52
Implement salting and hashing
53
The public ledger
54
Red team
55
The data steward
56
Offboarding
57
ESP
58
Security awareness training
59
SSO would reduce the resilience and availability of system if the provider goes offline.
60
Change the default password for the switch.
61
Apply the patches to systems in a testing environment then to systems in a staging environment, and finally to production systems.
62
Keypad PIN
63
protecting large amounts of data
64
Implement full backups every Sunday at 8:00 p.m. and nightly differential backups at 8:00 p.m.
65
CVE
66
LESSONS LEARNED
67
RAID 6
68
Data encryption
69
A WIDS
70
An MOU
71
The dark web
72
RTO
73
Purchase services from a cloud provider for high availability
74
A log analysis
75
A capture-the-flag competition
76
An attacker temporarily pawned a name server
77
Benchmarks
78
An SLA
79
Segmentation
80
ISO 27701
81
EDR
82
Compensating
83
Weak encryption
84
Create different accounts for each region. limit their logon times, and alert on risky logins
85
Connect a write blocker to the hard drive Then leveraging a forensic workstation, utilize the dd command m a live Linux environment to create a duplicate copy
86
Containerization, Remote control
87
ESP
88
Watering-hole attack
89
DDOS
90
Wireshark
91
ARP poisoning
92
Containerization
93
A tabletop exercise
94
A USB data blocker
95
http://sample.url.com/someotherpageonsite/…/…/…/etc/shadow
96
Impossible travel time
97
NIPS
98
XSS attack
99
Mandatory vacation, Job rotation
100
Transference
security+1
security+1
lopkeda · 100問 · 2年前security+1
security+1
100問 • 2年前security+6
security+6
lopkeda · 100問 · 2年前security+6
security+6
100問 • 2年前security+7
security+7
lopkeda · 100問 · 2年前security+7
security+7
100問 • 2年前security+8
security+8
lopkeda · 100問 · 2年前security+8
security+8
100問 • 2年前security+9
security+9
lopkeda · 100問 · 2年前security+9
security+9
100問 • 2年前security+10
security+10
lopkeda · 100問 · 2年前security+10
security+10
100問 • 2年前security+11
security+11
lopkeda · 100問 · 2年前security+11
security+11
100問 • 2年前security+12
security+12
lopkeda · 64問 · 2年前security+12
security+12
64問 • 2年前cysa+1
cysa+1
lopkeda · 100問 · 2年前cysa+1
cysa+1
100問 • 2年前cysa+2
cysa+2
lopkeda · 100問 · 2年前cysa+2
cysa+2
100問 • 2年前cysa+3
cysa+3
lopkeda · 54問 · 1年前cysa+3
cysa+3
54問 • 1年前A+1
A+1
lopkeda · 100問 · 1年前A+1
A+1
100問 • 1年前問題一覧
1
OTP token combined with password
2
Denial of service
3
AUP
4
DNS hijacking, Man-in-the-browser
5
Logic bomb
6
Dumpster diving
7
Job rotation
8
TLS1.2
9
Public SaaS
10
A digital certificate on a physical token that is unlocked with a secret passcode
11
designed to specifically mitigate risk.
12
arbitrary code execution.
13
Social engineering
14
Using a popular website login to provide access to another website
15
Honeynet
16
Some users are reusing passwords, and some of the compromised passwords are valid on multiple systems.
17
Removable media control
18
Industry information-sharing and collaboration groups
19
Use SSH keys and remove generic passwords
20
Application whitelisting
21
The cloud vendor is a new attack vector within the supply chain
22
Evil twin
23
There was malicious code on the USB drive
24
head, grep
25
Geolocation, Time-of-day restrictions
26
Classify the data
27
Data masking
28
A malicious USB was introduced by an unsuspecting employee
29
The data controller
30
Smishing
31
RAID 5
32
Fuzzing
33
MAC Flooding
34
Security information and event management
35
Updating the playbooks with better decision points
36
Load balancing, RAID
37
Containment
38
Implement BYOD for the sates department while leveraging the MDM
39
Loss of proprietary information
40
Network diagrams
41
MTRE ATT$CK
42
DLP
43
Detonate the document in an analysis sandbox
44
Split tunneling
45
EDR
46
SOAR
47
Input validation
48
Implement a hot-site failover location
49
Obfuscation
50
Document the collection and require a sign-off when possession changes.
51
Incremental backups Monday through Friday at 6:00 p.m and differential backups hourly
52
Implement salting and hashing
53
The public ledger
54
Red team
55
The data steward
56
Offboarding
57
ESP
58
Security awareness training
59
SSO would reduce the resilience and availability of system if the provider goes offline.
60
Change the default password for the switch.
61
Apply the patches to systems in a testing environment then to systems in a staging environment, and finally to production systems.
62
Keypad PIN
63
protecting large amounts of data
64
Implement full backups every Sunday at 8:00 p.m. and nightly differential backups at 8:00 p.m.
65
CVE
66
LESSONS LEARNED
67
RAID 6
68
Data encryption
69
A WIDS
70
An MOU
71
The dark web
72
RTO
73
Purchase services from a cloud provider for high availability
74
A log analysis
75
A capture-the-flag competition
76
An attacker temporarily pawned a name server
77
Benchmarks
78
An SLA
79
Segmentation
80
ISO 27701
81
EDR
82
Compensating
83
Weak encryption
84
Create different accounts for each region. limit their logon times, and alert on risky logins
85
Connect a write blocker to the hard drive Then leveraging a forensic workstation, utilize the dd command m a live Linux environment to create a duplicate copy
86
Containerization, Remote control
87
ESP
88
Watering-hole attack
89
DDOS
90
Wireshark
91
ARP poisoning
92
Containerization
93
A tabletop exercise
94
A USB data blocker
95
http://sample.url.com/someotherpageonsite/…/…/…/etc/shadow
96
Impossible travel time
97
NIPS
98
XSS attack
99
Mandatory vacation, Job rotation
100
Transference