EC: C2 Deep Pt.4
問題一覧
1
Active Directory
2
Login script
3
Windows domain
4
Group Policy
5
True
6
False
7
Folder redirection
8
Security Groups
9
WPA3
10
TKIP
11
WEP
12
AES
13
AES-CCMP
14
AES-GCMP, AES-CCMP
15
PSK
16
SAE
17
WPA3-SAE
18
Suitable for large corporate networks, IEEE 802.1X, Requires RADIUS authentication server
19
Authentication
20
Authorization
21
Accounting
22
TACACS+, RADIUS
23
Encrypts the entire payload of the access-request packet, Primarily used for device administration, Separates authentication and authorization
24
Primarily used for network access, Combines authentication and authorization, Encrypts only the password in the access-request packet
25
Kerberos
26
Kerberos
27
Replay attacks
28
Malware
29
True
30
Rootkit
31
A self-replicating computer program containing malicious segment, Malware that requires its host application to be run to make the virus active, Malicious code that attaches itself to an application program or other executable component
32
Spyware
33
Ransomware
34
Keylogger
35
Boot sector virus
36
Cryptominer
37
OS reinstallation
38
Phishing
39
Vishing
40
Shoulder surfing
41
Whaling
42
Gaining unauthorized access to restricted areas by following another person
43
Impersonation
44
True
45
True
46
Resource exhaustion
47
True
48
Zero-day attack
49
Spoofing, Social engineering
50
An on-path attack is also known as MitM attack, Attackers place themselves on the communication route between two devices, Attackers intercept or modify packets sent between two communicating devices
51
Brute-force attack
52
Dictionary attack
53
Insider threat
54
SQL injection attacks
55
Input validation
56
Exploits the trust a user's web browser has in a website, A malicious script is injected into a trusted website, User's browser executes attacker's script
57
True
58
Windows Update
59
True
60
BYOD
61
All of the above
62
All of the above
63
True
64
All of the above
65
Microsoft account
66
Standard Users
67
Administrator
68
True
69
Power Users
70
Username, PIN, Password
71
Fingerprint, Facial recognition
72
NTFS permissions apply to both network and local users, NTFS permissions can be applied to a folder or individual file
73
Apply only to network users, Can be set on a folder level
74
The most restrictive permission
75
Read when accessing the share remotely, Modify when accessing the folder locally
76
Read when accessing the share remotely, Read when accessing the folder locally
77
Explicit Deny > Explicit Allow > Inherited Deny > Inherited Allow
78
True
79
attrib +R [drive:] [path] [filename]
80
False
81
False
82
False
83
True
84
True
85
True
86
True
87
UAC
88
Right-click on an application icon > select Run as administrator from the pop-up menu, In Windows Start menu press and hold Control + Shift keys > left-click on an application icon, Launch Windows Run dialog box (Windows logo key + R) > type in the application's name > press Control + Shift + Enter
89
BitLocker
90
BitLocker To Go
91
EFS
DION#1
DION#1
Mixtapes øf Hanna · 90問 · 1年前DION#1
DION#1
90問 • 1年前DION#2
DION#2
Mixtapes øf Hanna · 90問 · 1年前DION#2
DION#2
90問 • 1年前DION#3
DION#3
Mixtapes øf Hanna · 90問 · 1年前DION#3
DION#3
90問 • 1年前DION#4
DION#4
Mixtapes øf Hanna · 90問 · 1年前DION#4
DION#4
90問 • 1年前DION#5
DION#5
Mixtapes øf Hanna · 89問 · 1年前DION#5
DION#5
89問 • 1年前DION#6
DION#6
Mixtapes øf Hanna · 87問 · 1年前DION#6
DION#6
87問 • 1年前ID: PT.1 COLLABORATE
ID: PT.1 COLLABORATE
Mixtapes øf Hanna · 95問 · 1年前ID: PT.1 COLLABORATE
ID: PT.1 COLLABORATE
95問 • 1年前ID: C2 Deep Pt.1
ID: C2 Deep Pt.1
Mixtapes øf Hanna · 90問 · 1年前ID: C2 Deep Pt.1
ID: C2 Deep Pt.1
90問 • 1年前ID: C2 Deep Pt.2
ID: C2 Deep Pt.2
Mixtapes øf Hanna · 98問 · 1年前ID: C2 Deep Pt.2
ID: C2 Deep Pt.2
98問 • 1年前ID: C2 Deep Pt.3
ID: C2 Deep Pt.3
Mixtapes øf Hanna · 93問 · 1年前ID: C2 Deep Pt.3
ID: C2 Deep Pt.3
93問 • 1年前ID: C2 Deep Pt.4
ID: C2 Deep Pt.4
Mixtapes øf Hanna · 85問 · 1年前ID: C2 Deep Pt.4
ID: C2 Deep Pt.4
85問 • 1年前OL BOYS STUDY GUIDE
OL BOYS STUDY GUIDE
Mixtapes øf Hanna · 70問 · 1年前OL BOYS STUDY GUIDE
OL BOYS STUDY GUIDE
70問 • 1年前MASTER REVIEW
MASTER REVIEW
Mixtapes øf Hanna · 44問 · 1年前MASTER REVIEW
MASTER REVIEW
44問 • 1年前EC: C2 Deep PT.1
EC: C2 Deep PT.1
Mixtapes øf Hanna · 96問 · 1年前EC: C2 Deep PT.1
EC: C2 Deep PT.1
96問 • 1年前EC: C2 Deep PT.2
EC: C2 Deep PT.2
Mixtapes øf Hanna · 89問 · 1年前EC: C2 Deep PT.2
EC: C2 Deep PT.2
89問 • 1年前EC: C2 Deep Pt.3
EC: C2 Deep Pt.3
Mixtapes øf Hanna · 94問 · 1年前EC: C2 Deep Pt.3
EC: C2 Deep Pt.3
94問 • 1年前EC: C2 Deep Pt.5
EC: C2 Deep Pt.5
Mixtapes øf Hanna · 88問 · 1年前EC: C2 Deep Pt.5
EC: C2 Deep Pt.5
88問 • 1年前問題一覧
1
Active Directory
2
Login script
3
Windows domain
4
Group Policy
5
True
6
False
7
Folder redirection
8
Security Groups
9
WPA3
10
TKIP
11
WEP
12
AES
13
AES-CCMP
14
AES-GCMP, AES-CCMP
15
PSK
16
SAE
17
WPA3-SAE
18
Suitable for large corporate networks, IEEE 802.1X, Requires RADIUS authentication server
19
Authentication
20
Authorization
21
Accounting
22
TACACS+, RADIUS
23
Encrypts the entire payload of the access-request packet, Primarily used for device administration, Separates authentication and authorization
24
Primarily used for network access, Combines authentication and authorization, Encrypts only the password in the access-request packet
25
Kerberos
26
Kerberos
27
Replay attacks
28
Malware
29
True
30
Rootkit
31
A self-replicating computer program containing malicious segment, Malware that requires its host application to be run to make the virus active, Malicious code that attaches itself to an application program or other executable component
32
Spyware
33
Ransomware
34
Keylogger
35
Boot sector virus
36
Cryptominer
37
OS reinstallation
38
Phishing
39
Vishing
40
Shoulder surfing
41
Whaling
42
Gaining unauthorized access to restricted areas by following another person
43
Impersonation
44
True
45
True
46
Resource exhaustion
47
True
48
Zero-day attack
49
Spoofing, Social engineering
50
An on-path attack is also known as MitM attack, Attackers place themselves on the communication route between two devices, Attackers intercept or modify packets sent between two communicating devices
51
Brute-force attack
52
Dictionary attack
53
Insider threat
54
SQL injection attacks
55
Input validation
56
Exploits the trust a user's web browser has in a website, A malicious script is injected into a trusted website, User's browser executes attacker's script
57
True
58
Windows Update
59
True
60
BYOD
61
All of the above
62
All of the above
63
True
64
All of the above
65
Microsoft account
66
Standard Users
67
Administrator
68
True
69
Power Users
70
Username, PIN, Password
71
Fingerprint, Facial recognition
72
NTFS permissions apply to both network and local users, NTFS permissions can be applied to a folder or individual file
73
Apply only to network users, Can be set on a folder level
74
The most restrictive permission
75
Read when accessing the share remotely, Modify when accessing the folder locally
76
Read when accessing the share remotely, Read when accessing the folder locally
77
Explicit Deny > Explicit Allow > Inherited Deny > Inherited Allow
78
True
79
attrib +R [drive:] [path] [filename]
80
False
81
False
82
False
83
True
84
True
85
True
86
True
87
UAC
88
Right-click on an application icon > select Run as administrator from the pop-up menu, In Windows Start menu press and hold Control + Shift keys > left-click on an application icon, Launch Windows Run dialog box (Windows logo key + R) > type in the application's name > press Control + Shift + Enter
89
BitLocker
90
BitLocker To Go
91
EFS