問題一覧
1
- Different antimalware engines call the same malware package by different names.
2
- Performance Monitor
3
- resmon
4
- Building a similarity graph of similar functions across binaries
5
- Remote execution of code
6
- 80 and 443
7
- Availability
8
- Administrators may ignore or filter the alerts
9
- Behavior
10
- Reducing the threat attack surface area
11
- An RDP connection m
12
- /var/log/auth.log
13
- If files in the directory have changed
14
- The user has opened an interactive command prompt as administrator on a remote workstation.
15
- A denial-of-service attack.
16
- Another antivirus program has interfered with the scan.
17
- Allowlisting
18
-
19
- The headers were forged to make it appear to have come from John Smith.
20
- DMARC
21
- Private key
22
- SOAR
23
- A goal m
24
- Oracle
25
- A shuffler
26
- A vulnerability scan
27
- The firewall m
28
- No ports should be open.
29
- Processes other than explorer.exe typically do not launch command prompts. m
30
- Registry edits launched via the command line from Explorer m
31
- Place a network firewall between the devices and the rest of the network.
32
- top
33
- High CPU utilization
34
- top
35
- kill
36
- Initiate the organization's incident response plan.
37
- Software agents
38
- Logging all shell commands to /dev/null
39
- You cannot determine if a message was forwarded by analyzing the headers.
40
- Check the passwd binary against a known good version.
41
- Service replacement
42
- Users who are logged in to more than one machine within four hours
43
- strings
44
- 714
45
- APT
46
- /etc/shadow and /etc/passwd cannot be diffed to create a useful comparison.
47
- API
48
- The email signature block
49
- Scanning all email using an antimalware tool
50
- A sandbox
51
- A brute-force attack against the root account.
52
- Change sshd_config to deny root login.
53
- It opens a reverse shell for host 10.1.2.3 using netcat every Friday at 8:30 p.m.
54
- Fail2ban has blocked the SSH login attempts.
55
- A sandbox tool
56
- The user set up netcat as a listener to push example.zip.
57
- IRC
58
- Using application allowlisting to prevent all prohibited programs from running.
59
- User chuck has read, write, and execute rights on the file. Members of admingroup group can read and write to the file but cannot execute it, and all users on the system can read the file.
60
- An attempt to edit the 404 page.
61
- SOAR
62
- A VPN application
63
- Anomalous behavior
64
- Data enrichment uses events and nonevent information to improve security insights, instead of just combining threat information. m
65
- Performance management
66
- Install and use Tripwire.
67
- Anomalies in privileged account usage
68
- Activity Monitor
69
- Form a hypothesis.
70
- An awareness campaign
71
- AI/ML-based investigation
72
- All of the above.
73
- To leverage the similarity of threat profiles
74
- SCAP
75
- UEBA
76
- All of the above
77
- IP address
78
- Methods of data ingestion
79
- Data enrichment
80
- Inserts itself into the Registry
81
- Machine learning
82
- SOAR systems integrate a wider range of internal and external systems.
83
- Her own natural biases
84
- Implementing NetFlow
85
- 20.3 percent
86
- 49.51.172.56
87
- Wireshark
88
- An incorrect time zone setting
89
- Hacktivist
90
- Business rules
91
- An EDR
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- Different antimalware engines call the same malware package by different names.
2
- Performance Monitor
3
- resmon
4
- Building a similarity graph of similar functions across binaries
5
- Remote execution of code
6
- 80 and 443
7
- Availability
8
- Administrators may ignore or filter the alerts
9
- Behavior
10
- Reducing the threat attack surface area
11
- An RDP connection m
12
- /var/log/auth.log
13
- If files in the directory have changed
14
- The user has opened an interactive command prompt as administrator on a remote workstation.
15
- A denial-of-service attack.
16
- Another antivirus program has interfered with the scan.
17
- Allowlisting
18
-
19
- The headers were forged to make it appear to have come from John Smith.
20
- DMARC
21
- Private key
22
- SOAR
23
- A goal m
24
- Oracle
25
- A shuffler
26
- A vulnerability scan
27
- The firewall m
28
- No ports should be open.
29
- Processes other than explorer.exe typically do not launch command prompts. m
30
- Registry edits launched via the command line from Explorer m
31
- Place a network firewall between the devices and the rest of the network.
32
- top
33
- High CPU utilization
34
- top
35
- kill
36
- Initiate the organization's incident response plan.
37
- Software agents
38
- Logging all shell commands to /dev/null
39
- You cannot determine if a message was forwarded by analyzing the headers.
40
- Check the passwd binary against a known good version.
41
- Service replacement
42
- Users who are logged in to more than one machine within four hours
43
- strings
44
- 714
45
- APT
46
- /etc/shadow and /etc/passwd cannot be diffed to create a useful comparison.
47
- API
48
- The email signature block
49
- Scanning all email using an antimalware tool
50
- A sandbox
51
- A brute-force attack against the root account.
52
- Change sshd_config to deny root login.
53
- It opens a reverse shell for host 10.1.2.3 using netcat every Friday at 8:30 p.m.
54
- Fail2ban has blocked the SSH login attempts.
55
- A sandbox tool
56
- The user set up netcat as a listener to push example.zip.
57
- IRC
58
- Using application allowlisting to prevent all prohibited programs from running.
59
- User chuck has read, write, and execute rights on the file. Members of admingroup group can read and write to the file but cannot execute it, and all users on the system can read the file.
60
- An attempt to edit the 404 page.
61
- SOAR
62
- A VPN application
63
- Anomalous behavior
64
- Data enrichment uses events and nonevent information to improve security insights, instead of just combining threat information. m
65
- Performance management
66
- Install and use Tripwire.
67
- Anomalies in privileged account usage
68
- Activity Monitor
69
- Form a hypothesis.
70
- An awareness campaign
71
- AI/ML-based investigation
72
- All of the above.
73
- To leverage the similarity of threat profiles
74
- SCAP
75
- UEBA
76
- All of the above
77
- IP address
78
- Methods of data ingestion
79
- Data enrichment
80
- Inserts itself into the Registry
81
- Machine learning
82
- SOAR systems integrate a wider range of internal and external systems.
83
- Her own natural biases
84
- Implementing NetFlow
85
- 20.3 percent
86
- 49.51.172.56
87
- Wireshark
88
- An incorrect time zone setting
89
- Hacktivist
90
- Business rules
91
- An EDR