CNL_CH_6
問題一覧
1
WAF
2
Internet proxy
3
Encrypted VPN traffic will not be inspected when entering or leaving the network
4
Reverse proxy
5
Load balancer
6
Implement a heuristic behavior-detection solution
7
A company purchased an IPS system, but after reviewing the requirements, the appliance was supposed to monitor, not block, any traffic.
8
Uninterruptible power supplies with battery backup
9
Network segmentation
10
Multipathing
11
On-path attack
12
MAC flooding
13
Host-based firewall
14
VLAN segmentation
15
Jump servers
16
DNS poisoning
17
A
18
Overwriting
19
ARP poisoning
20
An intrusion detection system
21
Utilizing SIEM correlation engines
22
A screened subnet (DMZ)
23
MAC
24
An ACL
25
Option D
26
Segmentation
27
Add more VLANs to the hypervisor network switches.
28
DNSSEC
29
A jump server
30
A jump server
31
Generate a list of domains similar to the company's own and implement a DNS sinkhole for each.
32
Scalability, Redundancy
33
EDR
34
Awareness training
35
Site-to-site
36
Split tunneling
37
Ahoneyfile
38
The document is a honeyfile and is meant to attract the attention of a cyber intruder.
39
Configuring an always-on VPN
40
AH
41
Configuring QoS properly on the VPN accelerators
42
C. ESP
43
A honeypot
44
NIPS (Network-based intrusion prevention system)
45
The baseline
46
Physically check each system
47
AH (Authentication Header)
48
Honeypots
49
DNS sinkhole
50
Enforce a policy that allows employees to be able to access their email only while they are connected to the internet via VPN
51
EDR
52
EDR
53
Configure NAT on the core router, Enable TLSv2 encryption on the web server
54
VPN with full tunneling and NAS authenticating through the Active Directory
55
Segment the network with firewalls.
56
A host-based firewall, AVPN
57
Man-in-the-middle
58
MAC Flooding
59
MAC address cloning
60
Honeynet
61
ARP poisoning
62
ARP poisoning
63
MAC flooding
64
MAC cloning
65
Benchmarks
66
Segmentation
67
Defense in depth
68
A VLAN, ADMZ
69
Active-passive
70
Routing tables have been compromised, and an attacker is rerouting traffic to malicious websites
71
To protect sites on web servers that are publicly accessible
72
Create and apply micro segmentation rules.
73
Host the web server in a DMZ and the file servers behind a firewall
74
Standard naming conventions
75
DNS spoofing
76
DNS poisoning
77
NAT, Content filter
78
EDR
79
IPSec, SSL VPN
80
Standard naming convention policy
81
VPN
82
Establish SSH access to a jump server, Enable MFA for intranet systems
83
ARP poisoning
84
user-agent spoofing
85
NAC
86
Jump server
87
BlueJacking
88
IPSec
89
Deploying a jump server that is accessible via the internal network that can communicate with the servers
90
CIS benchmarks
91
UTM
92
access-list inbound deny ip source 10.1.4.9/32 destination 0.0.0.0/0
93
Ensuring that port 53 has been explicitly allowed in the rule set
94
Testing the policy in a non-production environment before enabling the policy in the production network
95
Network segmentation
96
Intrusion prevention system
97
WAF
98
Secure configuration guide
99
The internal DNS servers were poisoned and were redirecting acmetimekeeping.com to a malicious domain that intercepted the credentials and then passed them through to the real site.
100
Always-on VPN
CNL_CH_1
CNL_CH_1
Son Cagrı · 3回閲覧 · 185問 · 2年前CNL_CH_1
CNL_CH_1
3回閲覧 • 185問 • 2年前CNL_CH_2
CNL_CH_2
Son Cagrı · 109問 · 2年前CNL_CH_2
CNL_CH_2
109問 • 2年前CNL_CH_3
CNL_CH_3
Son Cagrı · 90問 · 2年前CNL_CH_3
CNL_CH_3
90問 • 2年前CNL_CH_4
CNL_CH_4
Son Cagrı · 48問 · 2年前CNL_CH_4
CNL_CH_4
48問 • 2年前CNL_CH_5
CNL_CH_5
Son Cagrı · 83問 · 2年前CNL_CH_5
CNL_CH_5
83問 • 2年前CNL_CH_7
CNL_CH_7
Son Cagrı · 43問 · 2年前CNL_CH_7
CNL_CH_7
43問 • 2年前CNL_CH_8
CNL_CH_8
Son Cagrı · 66問 · 2年前CNL_CH_8
CNL_CH_8
66問 • 2年前CNL_CH_9
CNL_CH_9
Son Cagrı · 49問 · 2年前CNL_CH_9
CNL_CH_9
49問 • 2年前CNL_CH_10
CNL_CH_10
Son Cagrı · 75問 · 2年前CNL_CH_10
CNL_CH_10
75問 • 2年前CNL_CH_11
CNL_CH_11
Son Cagrı · 118問 · 2年前CNL_CH_11
CNL_CH_11
118問 • 2年前CNL_CH_12
CNL_CH_12
Son Cagrı · 124問 · 2年前CNL_CH_12
CNL_CH_12
124問 • 2年前CNL_CH_13
CNL_CH_13
Son Cagrı · 95問 · 2年前CNL_CH_13
CNL_CH_13
95問 • 2年前21 Mayis
21 Mayis
Son Cagrı · 69問 · 1年前21 Mayis
21 Mayis
69問 • 1年前20 Mayis -175-
20 Mayis -175-
Son Cagrı · 174問 · 1年前20 Mayis -175-
20 Mayis -175-
174問 • 1年前30 Mayis
30 Mayis
Son Cagrı · 209問 · 1年前30 Mayis
30 Mayis
209問 • 1年前A-1
A-1
Son Cagrı · 216問 · 1年前A-1
A-1
216問 • 1年前A-2
A-2
Son Cagrı · 184問 · 1年前A-2
A-2
184問 • 1年前A-3
A-3
Son Cagrı · 68問 · 1年前A-3
A-3
68問 • 1年前exam topics
exam topics
Son Cagrı · 306問 · 1年前exam topics
exam topics
306問 • 1年前pass4future
pass4future
Son Cagrı · 330問 · 1年前pass4future
pass4future
330問 • 1年前son 1
son 1
Son Cagrı · 349問 · 1年前son 1
son 1
349問 • 1年前son 2
son 2
Son Cagrı · 113問 · 1年前son 2
son 2
113問 • 1年前son 3
son 3
Son Cagrı · 63問 · 1年前son 3
son 3
63問 • 1年前問題一覧
1
WAF
2
Internet proxy
3
Encrypted VPN traffic will not be inspected when entering or leaving the network
4
Reverse proxy
5
Load balancer
6
Implement a heuristic behavior-detection solution
7
A company purchased an IPS system, but after reviewing the requirements, the appliance was supposed to monitor, not block, any traffic.
8
Uninterruptible power supplies with battery backup
9
Network segmentation
10
Multipathing
11
On-path attack
12
MAC flooding
13
Host-based firewall
14
VLAN segmentation
15
Jump servers
16
DNS poisoning
17
A
18
Overwriting
19
ARP poisoning
20
An intrusion detection system
21
Utilizing SIEM correlation engines
22
A screened subnet (DMZ)
23
MAC
24
An ACL
25
Option D
26
Segmentation
27
Add more VLANs to the hypervisor network switches.
28
DNSSEC
29
A jump server
30
A jump server
31
Generate a list of domains similar to the company's own and implement a DNS sinkhole for each.
32
Scalability, Redundancy
33
EDR
34
Awareness training
35
Site-to-site
36
Split tunneling
37
Ahoneyfile
38
The document is a honeyfile and is meant to attract the attention of a cyber intruder.
39
Configuring an always-on VPN
40
AH
41
Configuring QoS properly on the VPN accelerators
42
C. ESP
43
A honeypot
44
NIPS (Network-based intrusion prevention system)
45
The baseline
46
Physically check each system
47
AH (Authentication Header)
48
Honeypots
49
DNS sinkhole
50
Enforce a policy that allows employees to be able to access their email only while they are connected to the internet via VPN
51
EDR
52
EDR
53
Configure NAT on the core router, Enable TLSv2 encryption on the web server
54
VPN with full tunneling and NAS authenticating through the Active Directory
55
Segment the network with firewalls.
56
A host-based firewall, AVPN
57
Man-in-the-middle
58
MAC Flooding
59
MAC address cloning
60
Honeynet
61
ARP poisoning
62
ARP poisoning
63
MAC flooding
64
MAC cloning
65
Benchmarks
66
Segmentation
67
Defense in depth
68
A VLAN, ADMZ
69
Active-passive
70
Routing tables have been compromised, and an attacker is rerouting traffic to malicious websites
71
To protect sites on web servers that are publicly accessible
72
Create and apply micro segmentation rules.
73
Host the web server in a DMZ and the file servers behind a firewall
74
Standard naming conventions
75
DNS spoofing
76
DNS poisoning
77
NAT, Content filter
78
EDR
79
IPSec, SSL VPN
80
Standard naming convention policy
81
VPN
82
Establish SSH access to a jump server, Enable MFA for intranet systems
83
ARP poisoning
84
user-agent spoofing
85
NAC
86
Jump server
87
BlueJacking
88
IPSec
89
Deploying a jump server that is accessible via the internal network that can communicate with the servers
90
CIS benchmarks
91
UTM
92
access-list inbound deny ip source 10.1.4.9/32 destination 0.0.0.0/0
93
Ensuring that port 53 has been explicitly allowed in the rule set
94
Testing the policy in a non-production environment before enabling the policy in the production network
95
Network segmentation
96
Intrusion prevention system
97
WAF
98
Secure configuration guide
99
The internal DNS servers were poisoned and were redirecting acmetimekeeping.com to a malicious domain that intercepted the credentials and then passed them through to the real site.
100
Always-on VPN