問題一覧
1
- An EDR
2
- Performing static analysis of the malware
3
- CASB
4
- None of the above
5
- WHOIS lookups and NXDOMAIN queries of suspect URLs
6
- The dashboard
7
- All occurrences of the sudo command in bash log files in user home directories
8
- Beacon protocol
9
- Portmon
10
- Resource Monitor
11
- The memory usage is stable and can be left as it is.
12
- 1, 3, and 5
13
- The network link has been restored.
14
- IP reputation
15
- Flow logs with heuristic analysis
16
- The vendor that built the system
17
- ifconfig resets traffic counters at 4 GB.
18
- Check / home/ for new user directories.
19
- An ISAC
20
- The sender sent via a system in Japan.
21
- Antivirus vendors use different names for the same malware.
22
- Activity Monitor
23
- Successful logins
24
- Anomaly analysis
25
- Memory resources are available but being tasked by memory management processes
26
- Generate a known event ID and monitor for it.
27
- Interactive behavior analysis
28
- Reverse engineering
29
- Capture network flows for all hosts and use filters to remove normal traffic types.
30
- Submit them to a site like Virus Total.
31
- His primary link went down, and he should check his secondary link for traffic.
32
- Identify unexpected traffic during breaks like the low point at Christmas.
33
- They quietly gather information from compromised systems.
34
- Review the sites visited by the web browser when the CPU utilization issues occur.
35
- A behavior-based analysis tool
36
- 22
37
- Scheduled tasks
38
- Level 0
39
- /etc
40
- MALWARESCAN. EXE
41
- CPU
42
- Screened subnet
43
- Private cloud
44
- Identity of a user or device
45
- Hypervisor
46
- Shadow file
47
- PII
48
- This is a URL redirection domain.
49
- Sandboxing
50
- Script kiddie
51
- Web server logs
52
- ISACS
53
- Human Resources
54
- The attack vector
55
- Repeatable
56
- API-based CASB
57
- IP address
58
- OpeniD Connect
59
- WHOIS
60
- loC
61
- Something you know
62
- Hybrid cloud
63
- Worm
64
- Nation-state actors
65
- Port scans
66
- DLP
67
- Privileged access
68
- A sandbox
69
- Implement awareness training including simulated phishing attacks.
70
- Detail
71
- Cloud and network data collection and central analysis
72
- Pacu
73
- Rootkit
74
- STIX
75
- Rely on vendor testing and audits.
76
- Broken access control
77
- Persistent
78
- High.
79
- Unprotected storage
80
- A proxy scan
81
- Banner grabbing
82
- Operating system and Common Platform Enumeration (CPE) data
83
- Total loss of confidentiality, integrity, and availability
84
- A wireless router
85
- Limit information available via the organizational website without authentication.
86
- A TCP SYN scan
87
- Total attack surface
88
- Malware
89
- Determine the reason for the ports being open.
90
- MySQL
91
- Perform a DNS brute-force attack.
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- An EDR
2
- Performing static analysis of the malware
3
- CASB
4
- None of the above
5
- WHOIS lookups and NXDOMAIN queries of suspect URLs
6
- The dashboard
7
- All occurrences of the sudo command in bash log files in user home directories
8
- Beacon protocol
9
- Portmon
10
- Resource Monitor
11
- The memory usage is stable and can be left as it is.
12
- 1, 3, and 5
13
- The network link has been restored.
14
- IP reputation
15
- Flow logs with heuristic analysis
16
- The vendor that built the system
17
- ifconfig resets traffic counters at 4 GB.
18
- Check / home/ for new user directories.
19
- An ISAC
20
- The sender sent via a system in Japan.
21
- Antivirus vendors use different names for the same malware.
22
- Activity Monitor
23
- Successful logins
24
- Anomaly analysis
25
- Memory resources are available but being tasked by memory management processes
26
- Generate a known event ID and monitor for it.
27
- Interactive behavior analysis
28
- Reverse engineering
29
- Capture network flows for all hosts and use filters to remove normal traffic types.
30
- Submit them to a site like Virus Total.
31
- His primary link went down, and he should check his secondary link for traffic.
32
- Identify unexpected traffic during breaks like the low point at Christmas.
33
- They quietly gather information from compromised systems.
34
- Review the sites visited by the web browser when the CPU utilization issues occur.
35
- A behavior-based analysis tool
36
- 22
37
- Scheduled tasks
38
- Level 0
39
- /etc
40
- MALWARESCAN. EXE
41
- CPU
42
- Screened subnet
43
- Private cloud
44
- Identity of a user or device
45
- Hypervisor
46
- Shadow file
47
- PII
48
- This is a URL redirection domain.
49
- Sandboxing
50
- Script kiddie
51
- Web server logs
52
- ISACS
53
- Human Resources
54
- The attack vector
55
- Repeatable
56
- API-based CASB
57
- IP address
58
- OpeniD Connect
59
- WHOIS
60
- loC
61
- Something you know
62
- Hybrid cloud
63
- Worm
64
- Nation-state actors
65
- Port scans
66
- DLP
67
- Privileged access
68
- A sandbox
69
- Implement awareness training including simulated phishing attacks.
70
- Detail
71
- Cloud and network data collection and central analysis
72
- Pacu
73
- Rootkit
74
- STIX
75
- Rely on vendor testing and audits.
76
- Broken access control
77
- Persistent
78
- High.
79
- Unprotected storage
80
- A proxy scan
81
- Banner grabbing
82
- Operating system and Common Platform Enumeration (CPE) data
83
- Total loss of confidentiality, integrity, and availability
84
- A wireless router
85
- Limit information available via the organizational website without authentication.
86
- A TCP SYN scan
87
- Total attack surface
88
- Malware
89
- Determine the reason for the ports being open.
90
- MySQL
91
- Perform a DNS brute-force attack.