A-2
問題一覧
1
A. Implement a SIEM to correlate logs from multiple sources looking for alterable incidents.
2
A. OWASP
3
A. SSH
4
C. Private key and self-signed certificate
5
B. Port 8080 is a non-standard port and should be blocked.
6
A. Multi Factor authentication
7
A. SOAR
8
A. Air gap
9
A. WAF
10
A. Lessons learned
11
C. The SMS OTP is more likely to be intercepted and lead to unauthorized disclosure of the code than the TOTP method.
12
B. Lack of vendor support
13
Ç. Dumpster diving
14
C. Salting
15
B. Implementing mandatory vacations
16
C. Inform the vendor of this discovery in a secure manner and apply appropriate mitigations
17
C. Supply chain attack
18
B. Integrating each SaaS solution with the identity provider
19
B. Reviewing the domain administrator group, removing all unnecessary administrators, and rotating all passwords
20
A. Playbooks
21
A. Secure web gateway
22
A. NIDS
23
B. Whaling
24
B. Deploying an appropriate in-line CASB solution
25
C. Standard naming conventions
26
A. It occurs during litigation and requires retention of both electronic and physical documents
27
C. Preventing unauthenticated clients access to the server
28
B. Account audits
29
C. Cloud
30
B. Spear phishing
31
C. Data masking
32
Evil twin
33
A. Perform nightly snapshots
34
Pass-the-hash
35
A. 802.1X
36
B. A rogue access point is allowing users to bypass controls.
37
A. A successful privilege escalation attack by a local user
38
B. Input sanitization
39
B. Smart card
40
A. Channel overlap
41
. Directory traversal
42
Ç. EAP-TLS
43
C. Both companies following the same CSF
44
Ç. Operational
45
On-path attack
46
B. Disable unnecessary services.
47
C. Destruction, D. SanitizatiKonserton
48
B. SAML
49
Ç. Staging
50
Ç. HVAC
51
Ç. Separation of duties
52
B. Port security
53
B. Snapshot
54
A. Remote wipe, Containerization
55
Ç. Detective
56
A. Perform an offline brute-force attack.
57
A. Full
58
hping
59
A. Spraying
60
C. Retention policy
61
B. Syslog data
62
A. CASB
63
C. Tabletop exercise
64
C. Unblock the OCSP protocol in the host-based firewall.
65
A. Heat map
66
Ç. Shadow IT
67
C. Asymmetric encryption
68
Lack of security updates
69
C. To reduce the risk that the procedures are performed incorrectly or by an unauthorized user
70
A. APT groups
71
B. CVSS
72
Tokenization
73
A. Token key
74
A. Script kiddie
75
B. Remote access Trojan
76
Ç. Invoice scam
77
A. Security group
78
A. Cross-site request forgery
79
B. SOC 2 Type II
80
Ç. Honeypot
81
Isolate the controller from the rest of the network and constrain connectivity.
82
Integrity
83
C. Proprietary
84
B. Honeypot
85
A. PIN
86
. To ensure only authorized users have the ability to obtain direct access to systems or data
87
Unidentified removable devices
88
C. Receiving a push notification to a mobile application
89
B. RAM
90
C. Decommissioning the system
91
False positive
92
VDI
93
Ç. Segregation of duties
94
B. Risk acceptance
95
Data blockers
96
C. Recurring
97
B. Firewall
98
C. A DNS sinkhole can be used to capture traffic to known-malicious domains used by attackers
99
B. Spraying
100
A. Non-repudiation
CNL_CH_1
CNL_CH_1
Son Cagrı · 3回閲覧 · 185問 · 2年前CNL_CH_1
CNL_CH_1
3回閲覧 • 185問 • 2年前CNL_CH_2
CNL_CH_2
Son Cagrı · 109問 · 2年前CNL_CH_2
CNL_CH_2
109問 • 2年前CNL_CH_3
CNL_CH_3
Son Cagrı · 90問 · 2年前CNL_CH_3
CNL_CH_3
90問 • 2年前CNL_CH_4
CNL_CH_4
Son Cagrı · 48問 · 2年前CNL_CH_4
CNL_CH_4
48問 • 2年前CNL_CH_5
CNL_CH_5
Son Cagrı · 83問 · 2年前CNL_CH_5
CNL_CH_5
83問 • 2年前CNL_CH_6
CNL_CH_6
Son Cagrı · 100問 · 2年前CNL_CH_6
CNL_CH_6
100問 • 2年前CNL_CH_7
CNL_CH_7
Son Cagrı · 43問 · 2年前CNL_CH_7
CNL_CH_7
43問 • 2年前CNL_CH_8
CNL_CH_8
Son Cagrı · 66問 · 2年前CNL_CH_8
CNL_CH_8
66問 • 2年前CNL_CH_9
CNL_CH_9
Son Cagrı · 49問 · 2年前CNL_CH_9
CNL_CH_9
49問 • 2年前CNL_CH_10
CNL_CH_10
Son Cagrı · 75問 · 2年前CNL_CH_10
CNL_CH_10
75問 • 2年前CNL_CH_11
CNL_CH_11
Son Cagrı · 118問 · 2年前CNL_CH_11
CNL_CH_11
118問 • 2年前CNL_CH_12
CNL_CH_12
Son Cagrı · 124問 · 2年前CNL_CH_12
CNL_CH_12
124問 • 2年前CNL_CH_13
CNL_CH_13
Son Cagrı · 95問 · 2年前CNL_CH_13
CNL_CH_13
95問 • 2年前21 Mayis
21 Mayis
Son Cagrı · 69問 · 1年前21 Mayis
21 Mayis
69問 • 1年前20 Mayis -175-
20 Mayis -175-
Son Cagrı · 174問 · 1年前20 Mayis -175-
20 Mayis -175-
174問 • 1年前30 Mayis
30 Mayis
Son Cagrı · 209問 · 1年前30 Mayis
30 Mayis
209問 • 1年前A-1
A-1
Son Cagrı · 216問 · 1年前A-1
A-1
216問 • 1年前A-3
A-3
Son Cagrı · 68問 · 1年前A-3
A-3
68問 • 1年前exam topics
exam topics
Son Cagrı · 306問 · 1年前exam topics
exam topics
306問 • 1年前pass4future
pass4future
Son Cagrı · 330問 · 1年前pass4future
pass4future
330問 • 1年前son 1
son 1
Son Cagrı · 349問 · 1年前son 1
son 1
349問 • 1年前son 2
son 2
Son Cagrı · 113問 · 1年前son 2
son 2
113問 • 1年前son 3
son 3
Son Cagrı · 63問 · 1年前son 3
son 3
63問 • 1年前問題一覧
1
A. Implement a SIEM to correlate logs from multiple sources looking for alterable incidents.
2
A. OWASP
3
A. SSH
4
C. Private key and self-signed certificate
5
B. Port 8080 is a non-standard port and should be blocked.
6
A. Multi Factor authentication
7
A. SOAR
8
A. Air gap
9
A. WAF
10
A. Lessons learned
11
C. The SMS OTP is more likely to be intercepted and lead to unauthorized disclosure of the code than the TOTP method.
12
B. Lack of vendor support
13
Ç. Dumpster diving
14
C. Salting
15
B. Implementing mandatory vacations
16
C. Inform the vendor of this discovery in a secure manner and apply appropriate mitigations
17
C. Supply chain attack
18
B. Integrating each SaaS solution with the identity provider
19
B. Reviewing the domain administrator group, removing all unnecessary administrators, and rotating all passwords
20
A. Playbooks
21
A. Secure web gateway
22
A. NIDS
23
B. Whaling
24
B. Deploying an appropriate in-line CASB solution
25
C. Standard naming conventions
26
A. It occurs during litigation and requires retention of both electronic and physical documents
27
C. Preventing unauthenticated clients access to the server
28
B. Account audits
29
C. Cloud
30
B. Spear phishing
31
C. Data masking
32
Evil twin
33
A. Perform nightly snapshots
34
Pass-the-hash
35
A. 802.1X
36
B. A rogue access point is allowing users to bypass controls.
37
A. A successful privilege escalation attack by a local user
38
B. Input sanitization
39
B. Smart card
40
A. Channel overlap
41
. Directory traversal
42
Ç. EAP-TLS
43
C. Both companies following the same CSF
44
Ç. Operational
45
On-path attack
46
B. Disable unnecessary services.
47
C. Destruction, D. SanitizatiKonserton
48
B. SAML
49
Ç. Staging
50
Ç. HVAC
51
Ç. Separation of duties
52
B. Port security
53
B. Snapshot
54
A. Remote wipe, Containerization
55
Ç. Detective
56
A. Perform an offline brute-force attack.
57
A. Full
58
hping
59
A. Spraying
60
C. Retention policy
61
B. Syslog data
62
A. CASB
63
C. Tabletop exercise
64
C. Unblock the OCSP protocol in the host-based firewall.
65
A. Heat map
66
Ç. Shadow IT
67
C. Asymmetric encryption
68
Lack of security updates
69
C. To reduce the risk that the procedures are performed incorrectly or by an unauthorized user
70
A. APT groups
71
B. CVSS
72
Tokenization
73
A. Token key
74
A. Script kiddie
75
B. Remote access Trojan
76
Ç. Invoice scam
77
A. Security group
78
A. Cross-site request forgery
79
B. SOC 2 Type II
80
Ç. Honeypot
81
Isolate the controller from the rest of the network and constrain connectivity.
82
Integrity
83
C. Proprietary
84
B. Honeypot
85
A. PIN
86
. To ensure only authorized users have the ability to obtain direct access to systems or data
87
Unidentified removable devices
88
C. Receiving a push notification to a mobile application
89
B. RAM
90
C. Decommissioning the system
91
False positive
92
VDI
93
Ç. Segregation of duties
94
B. Risk acceptance
95
Data blockers
96
C. Recurring
97
B. Firewall
98
C. A DNS sinkhole can be used to capture traffic to known-malicious domains used by attackers
99
B. Spraying
100
A. Non-repudiation