問題一覧
1
- Exact data match
2
- Statistical matching
3
- Classification
4
- Document matching
5
- Password spraying
6
- Session hijacking
7
- Credential stuffing
8
- Impersonation
9
- Planning (or Requirements Planning):, - Focus: Define the scope, purpose, and initial requirements of the software, but with a strong emphasis on security from the outset., - Requirements and Analysis:, - Focus: Detail functional and non-functional requirements, including specific security requirements., - Design:, - Focus: Translate requirements into a detailed architectural and technical design for the software., - Development (or Coding/Implementation):, - Focus: Write the actual code based on the design specifications., - Testing:, - Focus: Verify that the software meets its requirements and identify defects, including security vulnerabilities., - Deployment:, - Focus: Release the working software to production environments., - Maintenance (or Operations and Monitoring):, - Focus: Ongoing support, monitoring, and updates to the software after deployment.
10
- Security Onion
11
- Kali Linux
12
- Metasploit
13
- Wireshark
14
- secpol.msc
15
- services.msc
16
- wmic ( Windows Management Instrumentation )
17
- sc.exe
18
- Non-disclosure agreement (NDA)
19
- service level agreement (SLA)
20
- data sharing and use agreement (DSUA)
21
- interconnection security agreement (ISA)
22
- Regular, - Time to recovery is predictable with existing resources., - Supplemented, - Time to recovery is predictable with additional resources., - Extended, - Time to recovery is unpredictable; additional resources and outside help are needed., - Not Recoverable , - Recovery from the incident is not possible (e.g., sensitive data exfiltrated and posted publicly); launch an investigation.
23
- DomainKeys Identified Mail (DKIM)
24
- Sender Policy Framework (SPF)
25
- Simple Mail Transfer Protocol (SMTP)
26
- Domain-Based Message Authentication, Reporting, and Conformance (DMARC)
27
Is a foundational model in information security that represents three core principles essential for protecting information and systems.
28
- Confidentiality, - This principle ensures that sensitive information is accessible only to authorized individuals or systems. It's about preventing unauthorized disclosure of data., - Integrity, - This principle guarantees that information is accurate, complete, and trustworthy. It ensures that data has not been modified, altered, or destroyed in an unauthorized manner., - Availability, - This principle ensures that authorized users can reliably access information and systems when needed. It's about maintaining operational uptime and providing timely access to resources.
29
- Potential Reverse Shell
30
- XSS Attack
31
- SQL Injection
32
- Directory Traversal
33
- Metasploit
34
- Autopsy
35
- Nmap
36
- Nessus
37
- Brute force
38
- Password spraying
39
- Credential stuffing
40
- Impersonation
41
- MITRE ATT&CK
42
- Diamond Model of Intrusion Analysis
43
- Cyber Kill Chain
44
- The linear progression of a cyber attack
45
- MITRE ATT&CK framework
46
- OpenIOC
47
- Diamond Model of Intrusion Analysis
48
- Lockheed Martin cyber kill chain
49
- Cyber Kill Chain
50
- Diamond Model of Intrusion Analysis
51
- OWASP Testing Guide
52
- MITRE ATT&CK
53
- Developed
54
- Acquired and augmented
55
- Integrated
56
- Advanced
57
- CPU cache, - RAM, - Swap, - Hard drive
58
- Nmap
59
- Wireshark
60
- ping
61
- netstat
62
- Cross-site scripting
63
- Cross-site request forgery
64
- Command injection
65
- SQL injection
66
- Data minimization
67
- Anonymization
68
- Tokenization
69
- Data masking
70
- Chained exploit
71
- Denial of Service exploit
72
- SQL injection exploit
73
- Buffer overflow exploit
74
- Lateral Movement
75
- Exfiltration
76
- Credential Access
77
- Initial Access
78
- Level 0, - Emergency, - Level 1, - Alert, - Level 2, - Critical, - Level 3, - Errors, - Level 4, - Warnings, - Level 5, - Notifications, - Level 6, - Information, - Level 7, - Debugging
79
- Zone transfers
80
- FQDN resolution
81
- DNS poisoning
82
- Split horizon
83
- plists
84
- .config files
85
- The registry
86
- .profile files
87
- Heartbleed
88
- Carbanak
89
- BlueSmack
90
- ROBOT Attack
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- Exact data match
2
- Statistical matching
3
- Classification
4
- Document matching
5
- Password spraying
6
- Session hijacking
7
- Credential stuffing
8
- Impersonation
9
- Planning (or Requirements Planning):, - Focus: Define the scope, purpose, and initial requirements of the software, but with a strong emphasis on security from the outset., - Requirements and Analysis:, - Focus: Detail functional and non-functional requirements, including specific security requirements., - Design:, - Focus: Translate requirements into a detailed architectural and technical design for the software., - Development (or Coding/Implementation):, - Focus: Write the actual code based on the design specifications., - Testing:, - Focus: Verify that the software meets its requirements and identify defects, including security vulnerabilities., - Deployment:, - Focus: Release the working software to production environments., - Maintenance (or Operations and Monitoring):, - Focus: Ongoing support, monitoring, and updates to the software after deployment.
10
- Security Onion
11
- Kali Linux
12
- Metasploit
13
- Wireshark
14
- secpol.msc
15
- services.msc
16
- wmic ( Windows Management Instrumentation )
17
- sc.exe
18
- Non-disclosure agreement (NDA)
19
- service level agreement (SLA)
20
- data sharing and use agreement (DSUA)
21
- interconnection security agreement (ISA)
22
- Regular, - Time to recovery is predictable with existing resources., - Supplemented, - Time to recovery is predictable with additional resources., - Extended, - Time to recovery is unpredictable; additional resources and outside help are needed., - Not Recoverable , - Recovery from the incident is not possible (e.g., sensitive data exfiltrated and posted publicly); launch an investigation.
23
- DomainKeys Identified Mail (DKIM)
24
- Sender Policy Framework (SPF)
25
- Simple Mail Transfer Protocol (SMTP)
26
- Domain-Based Message Authentication, Reporting, and Conformance (DMARC)
27
Is a foundational model in information security that represents three core principles essential for protecting information and systems.
28
- Confidentiality, - This principle ensures that sensitive information is accessible only to authorized individuals or systems. It's about preventing unauthorized disclosure of data., - Integrity, - This principle guarantees that information is accurate, complete, and trustworthy. It ensures that data has not been modified, altered, or destroyed in an unauthorized manner., - Availability, - This principle ensures that authorized users can reliably access information and systems when needed. It's about maintaining operational uptime and providing timely access to resources.
29
- Potential Reverse Shell
30
- XSS Attack
31
- SQL Injection
32
- Directory Traversal
33
- Metasploit
34
- Autopsy
35
- Nmap
36
- Nessus
37
- Brute force
38
- Password spraying
39
- Credential stuffing
40
- Impersonation
41
- MITRE ATT&CK
42
- Diamond Model of Intrusion Analysis
43
- Cyber Kill Chain
44
- The linear progression of a cyber attack
45
- MITRE ATT&CK framework
46
- OpenIOC
47
- Diamond Model of Intrusion Analysis
48
- Lockheed Martin cyber kill chain
49
- Cyber Kill Chain
50
- Diamond Model of Intrusion Analysis
51
- OWASP Testing Guide
52
- MITRE ATT&CK
53
- Developed
54
- Acquired and augmented
55
- Integrated
56
- Advanced
57
- CPU cache, - RAM, - Swap, - Hard drive
58
- Nmap
59
- Wireshark
60
- ping
61
- netstat
62
- Cross-site scripting
63
- Cross-site request forgery
64
- Command injection
65
- SQL injection
66
- Data minimization
67
- Anonymization
68
- Tokenization
69
- Data masking
70
- Chained exploit
71
- Denial of Service exploit
72
- SQL injection exploit
73
- Buffer overflow exploit
74
- Lateral Movement
75
- Exfiltration
76
- Credential Access
77
- Initial Access
78
- Level 0, - Emergency, - Level 1, - Alert, - Level 2, - Critical, - Level 3, - Errors, - Level 4, - Warnings, - Level 5, - Notifications, - Level 6, - Information, - Level 7, - Debugging
79
- Zone transfers
80
- FQDN resolution
81
- DNS poisoning
82
- Split horizon
83
- plists
84
- .config files
85
- The registry
86
- .profile files
87
- Heartbleed
88
- Carbanak
89
- BlueSmack
90
- ROBOT Attack