security+8
問題一覧
1
Password complexity
2
Directory traversal, Privilege escalation
3
Network segmentation
4
ISO
5
Privilege escalation
6
Data can become a liability if archived longer than required by regulatory guidance
7
UPS
8
Community
9
Block port 3389 inbound from untrusted networks.
10
A CASB, An NG-SWG
11
Moble device management
12
Block unneeded TCP 445 connections
13
PKI
14
Implement a TAXI| server
15
Production
16
Acceptance
17
ISO 27001
18
Corporate PCs have been turned into a botnet
19
curl --head http://192.168.0.10
20
User behavior analysis
21
CVSS
22
RAID, UPS, Geographic dispersal
23
A
24
Calculate the checksum using a hashing algorithm
25
Memory leak
26
White-box
27
transference
28
Unknown backdoor
29
GDPR
30
Deterrent controls
31
Perform a mathematical operation on the passwords that will convert them into unique strings.
32
Standard naming conventions
33
Command and control
34
Proprietary
35
Enforce MFA when an account request reaches a risk threshold.
36
Steganography
37
File integrity monitonng for the source code
38
The identity federation protocol, The certificate authority
39
XSS
40
dd
41
DNSSEC
42
SaaS
43
Data anonymization
44
Enable MFA for intranet systems, Install VPN concentrations at home offices
45
Corrective
46
Attempt to quarantine all infected hosts to limit further spread.
47
LFI, Directory traversal
48
Collision
49
Zero day
50
Jump servers
51
Tabletop walk-through
52
VLAN segmentation
53
Vein
54
Weak credentials
55
AUP
56
Salting
57
A RAT
58
Utilize behavioral analysis to enable the SIEM's learning mode.
59
SOAR
60
Revoke the code signing certificate used by both programs.
61
Logs from each device type and security layer to provide correlation of events
62
Personal health information
63
Implement a vulnerability scan to assess dependencies earlier on SDLC.
64
Load balancer
65
To validate the integrity of the files
66
CASB
67
Implement access control vestibules.
68
Time-based logins
69
Replacing the traditional key with an RFID key
70
Increase in the attack surface
71
An attacker used a pass-the-hash attack to gain access
72
Compensating
73
PCI DSS
74
Chain of custody
75
DNS poisoning
76
Marketing strategies
77
EDR
78
VDl and thin clients
79
Communication plan
80
Injection
81
Clean desk
82
RPO
83
Hashing
84
CIS benchmarks
85
Wildcard
86
SaaS
87
Directory traversal
88
A phishing email stating a cash settlement has been awarded but will expire soon
89
Motion sensors with signage
90
Watering hole
91
NIST RMF
92
AUP
93
Rotate CIRT members to foster a shared responsibility model in the organization.
94
Message gateway
95
Buffer overflow
96
Configure the web content filter for the web address.
97
Tune monitoring in order to reduce false positive rates.
98
Supply chain
99
Version control
100
Detective
security+1
security+1
lopkeda · 100問 · 2年前security+1
security+1
100問 • 2年前security+2
security+2
lopkeda · 100問 · 2年前security+2
security+2
100問 • 2年前security+6
security+6
lopkeda · 100問 · 2年前security+6
security+6
100問 • 2年前security+7
security+7
lopkeda · 100問 · 2年前security+7
security+7
100問 • 2年前security+9
security+9
lopkeda · 100問 · 2年前security+9
security+9
100問 • 2年前security+10
security+10
lopkeda · 100問 · 2年前security+10
security+10
100問 • 2年前security+11
security+11
lopkeda · 100問 · 2年前security+11
security+11
100問 • 2年前security+12
security+12
lopkeda · 64問 · 2年前security+12
security+12
64問 • 2年前cysa+1
cysa+1
lopkeda · 100問 · 2年前cysa+1
cysa+1
100問 • 2年前cysa+2
cysa+2
lopkeda · 100問 · 2年前cysa+2
cysa+2
100問 • 2年前cysa+3
cysa+3
lopkeda · 54問 · 1年前cysa+3
cysa+3
54問 • 1年前A+1
A+1
lopkeda · 100問 · 1年前A+1
A+1
100問 • 1年前問題一覧
1
Password complexity
2
Directory traversal, Privilege escalation
3
Network segmentation
4
ISO
5
Privilege escalation
6
Data can become a liability if archived longer than required by regulatory guidance
7
UPS
8
Community
9
Block port 3389 inbound from untrusted networks.
10
A CASB, An NG-SWG
11
Moble device management
12
Block unneeded TCP 445 connections
13
PKI
14
Implement a TAXI| server
15
Production
16
Acceptance
17
ISO 27001
18
Corporate PCs have been turned into a botnet
19
curl --head http://192.168.0.10
20
User behavior analysis
21
CVSS
22
RAID, UPS, Geographic dispersal
23
A
24
Calculate the checksum using a hashing algorithm
25
Memory leak
26
White-box
27
transference
28
Unknown backdoor
29
GDPR
30
Deterrent controls
31
Perform a mathematical operation on the passwords that will convert them into unique strings.
32
Standard naming conventions
33
Command and control
34
Proprietary
35
Enforce MFA when an account request reaches a risk threshold.
36
Steganography
37
File integrity monitonng for the source code
38
The identity federation protocol, The certificate authority
39
XSS
40
dd
41
DNSSEC
42
SaaS
43
Data anonymization
44
Enable MFA for intranet systems, Install VPN concentrations at home offices
45
Corrective
46
Attempt to quarantine all infected hosts to limit further spread.
47
LFI, Directory traversal
48
Collision
49
Zero day
50
Jump servers
51
Tabletop walk-through
52
VLAN segmentation
53
Vein
54
Weak credentials
55
AUP
56
Salting
57
A RAT
58
Utilize behavioral analysis to enable the SIEM's learning mode.
59
SOAR
60
Revoke the code signing certificate used by both programs.
61
Logs from each device type and security layer to provide correlation of events
62
Personal health information
63
Implement a vulnerability scan to assess dependencies earlier on SDLC.
64
Load balancer
65
To validate the integrity of the files
66
CASB
67
Implement access control vestibules.
68
Time-based logins
69
Replacing the traditional key with an RFID key
70
Increase in the attack surface
71
An attacker used a pass-the-hash attack to gain access
72
Compensating
73
PCI DSS
74
Chain of custody
75
DNS poisoning
76
Marketing strategies
77
EDR
78
VDl and thin clients
79
Communication plan
80
Injection
81
Clean desk
82
RPO
83
Hashing
84
CIS benchmarks
85
Wildcard
86
SaaS
87
Directory traversal
88
A phishing email stating a cash settlement has been awarded but will expire soon
89
Motion sensors with signage
90
Watering hole
91
NIST RMF
92
AUP
93
Rotate CIRT members to foster a shared responsibility model in the organization.
94
Message gateway
95
Buffer overflow
96
Configure the web content filter for the web address.
97
Tune monitoring in order to reduce false positive rates.
98
Supply chain
99
Version control
100
Detective