問題一覧
1
- Customer communication
2
- DLP
3
- Inform management of the issue being experienced
4
- \b172\.16\.1\.(25[0-5]|2[0-4][0-9]|19[2-9])\b
5
- SSH
6
- This critical patch did not remediate the vulnerability, - The vulnerability assessment scan is returning a false positive
7
- FERPA
8
- The function is using hard-coded credentials to verify the password entered by the user
9
- Proper Scheduling of Patching and Vulnerability Mitigation
10
- OpenSSL 1.0.1g
11
- TLS
12
- Insider threat
13
- VLAN
14
- Create a script to automatically update the signatures every 24 hours
15
- Affected Hosts
16
- Physical accessibility, - Encryption
17
- Standardize processes and automate tasks
18
- SQL injection
19
- Wait for a malicious email attachment to be opened, - Take advantage of a software, hardware, or human vulnerability, - Wait for a user to click on a malicious link
20
- Schedule an emergency maintenance for an off-peak time later in the day to remediate the vulnerability
21
- Cognitive password attack
22
- Disabling unused services, - Segmentation
23
- Faulty input validation
24
- Suspend the machine and copy the contents of the directory it resides in
25
- Identify, implement, and document compensating controls
26
- Technical architecture
27
- Insecure direct object reference
28
- Router and switch-based MAC address reporting
29
- TCP ACK
30
- Agent-based scanning
31
- Any individual who worked with evidence during the investigation
32
- Weaponization
33
- Exploitation
34
- Mean time to detect (MTTD), mean time to respond (MTTR), and mean time to remediate (MTTR)
35
- Hacktivist
36
- Lessons learned
37
- Victim
38
- There are bad sectors on the destination drive
39
- Rules of engagement
40
- Counterfeiting
41
- Recurrence
42
- SNMP
43
- Improper input validation
44
- Fuzzing
45
- Golden ticket
46
- Implementing compensating controls
47
- TACACS+
48
- Data enrichment
49
- Containerization
50
- The host might use as a staging area for data exfiltration -- you should conduct volume-based trend analysis on the host's storage device
51
- Software development lifecycle model
52
- Bollards
53
- It provides a record of the incident, aids in decision-making, and supports regulatory compliance
54
- IPSec
55
- nmap -sT
56
- The /etc/passwd file was downloaded using a directory traversal attack if input validation of the URL was not conducted
57
- Transparency gap hampers addressing system vulnerabilities
58
- Utilize a secure recursive DNS resolver to a third-party secure DNS resolver
59
- Command and Control
60
- It helps in understanding the fundamental reasons leading to the incident, enabling better prevention strategies for the future
61
- Infrastructure
62
- Account credentials
63
- False positive
64
- ASLR
65
- The structure and content of your web directories
66
- The structure and content of your web directories
67
- It could indicate a need for improved security measures or updated software-
68
- Inadvertent release of information
69
- Utilize vendor testing and audits
70
- tcpdump -i eth0 host 10.10.1.1
71
- NAC, - GPS location
72
- Dependency on the cloud service provider, - Protection of endpoint security, - Limited disaster recovery options
73
- TCP 0.0.0.0:53 0.0.0.0:0 LISTENING, - TCP 192.168.1.4:53 208.71.44.30:80 ESTABLISHED, - TCP 192.168.1.4:53 91.198.117.247:443 CLOSE_WAIT
74
- Identify any potential risks associated with installing the patch, - Validate the installation of the patch in a staging environment, - Ensure all stakeholders are informed of the planned outage, - Document the change in the change management system
75
- Use a web application firewall (WAF) to block malicious traffic, - Use a firewall to restrict access to the affected systems
76
- Command and Control
77
- Memdump
78
- dion, - DION, - DIOn, - Dion
79
- Mandatory vacations
80
- By lacking available security patches and updates to address known vulnerabilities
81
- Install a mantrap at the entrance
82
- OWASP Testing Guide
83
- FISMA
84
- Search the registry for a complete list
85
- White team
86
- Ransomware
87
- It measures the efficiency of the incident response process and aids in improving response capabilities
88
- Burp Suite
89
- Diamond Model of Intrusion Analysis
90
- dd
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- Customer communication
2
- DLP
3
- Inform management of the issue being experienced
4
- \b172\.16\.1\.(25[0-5]|2[0-4][0-9]|19[2-9])\b
5
- SSH
6
- This critical patch did not remediate the vulnerability, - The vulnerability assessment scan is returning a false positive
7
- FERPA
8
- The function is using hard-coded credentials to verify the password entered by the user
9
- Proper Scheduling of Patching and Vulnerability Mitigation
10
- OpenSSL 1.0.1g
11
- TLS
12
- Insider threat
13
- VLAN
14
- Create a script to automatically update the signatures every 24 hours
15
- Affected Hosts
16
- Physical accessibility, - Encryption
17
- Standardize processes and automate tasks
18
- SQL injection
19
- Wait for a malicious email attachment to be opened, - Take advantage of a software, hardware, or human vulnerability, - Wait for a user to click on a malicious link
20
- Schedule an emergency maintenance for an off-peak time later in the day to remediate the vulnerability
21
- Cognitive password attack
22
- Disabling unused services, - Segmentation
23
- Faulty input validation
24
- Suspend the machine and copy the contents of the directory it resides in
25
- Identify, implement, and document compensating controls
26
- Technical architecture
27
- Insecure direct object reference
28
- Router and switch-based MAC address reporting
29
- TCP ACK
30
- Agent-based scanning
31
- Any individual who worked with evidence during the investigation
32
- Weaponization
33
- Exploitation
34
- Mean time to detect (MTTD), mean time to respond (MTTR), and mean time to remediate (MTTR)
35
- Hacktivist
36
- Lessons learned
37
- Victim
38
- There are bad sectors on the destination drive
39
- Rules of engagement
40
- Counterfeiting
41
- Recurrence
42
- SNMP
43
- Improper input validation
44
- Fuzzing
45
- Golden ticket
46
- Implementing compensating controls
47
- TACACS+
48
- Data enrichment
49
- Containerization
50
- The host might use as a staging area for data exfiltration -- you should conduct volume-based trend analysis on the host's storage device
51
- Software development lifecycle model
52
- Bollards
53
- It provides a record of the incident, aids in decision-making, and supports regulatory compliance
54
- IPSec
55
- nmap -sT
56
- The /etc/passwd file was downloaded using a directory traversal attack if input validation of the URL was not conducted
57
- Transparency gap hampers addressing system vulnerabilities
58
- Utilize a secure recursive DNS resolver to a third-party secure DNS resolver
59
- Command and Control
60
- It helps in understanding the fundamental reasons leading to the incident, enabling better prevention strategies for the future
61
- Infrastructure
62
- Account credentials
63
- False positive
64
- ASLR
65
- The structure and content of your web directories
66
- The structure and content of your web directories
67
- It could indicate a need for improved security measures or updated software-
68
- Inadvertent release of information
69
- Utilize vendor testing and audits
70
- tcpdump -i eth0 host 10.10.1.1
71
- NAC, - GPS location
72
- Dependency on the cloud service provider, - Protection of endpoint security, - Limited disaster recovery options
73
- TCP 0.0.0.0:53 0.0.0.0:0 LISTENING, - TCP 192.168.1.4:53 208.71.44.30:80 ESTABLISHED, - TCP 192.168.1.4:53 91.198.117.247:443 CLOSE_WAIT
74
- Identify any potential risks associated with installing the patch, - Validate the installation of the patch in a staging environment, - Ensure all stakeholders are informed of the planned outage, - Document the change in the change management system
75
- Use a web application firewall (WAF) to block malicious traffic, - Use a firewall to restrict access to the affected systems
76
- Command and Control
77
- Memdump
78
- dion, - DION, - DIOn, - Dion
79
- Mandatory vacations
80
- By lacking available security patches and updates to address known vulnerabilities
81
- Install a mantrap at the entrance
82
- OWASP Testing Guide
83
- FISMA
84
- Search the registry for a complete list
85
- White team
86
- Ransomware
87
- It measures the efficiency of the incident response process and aids in improving response capabilities
88
- Burp Suite
89
- Diamond Model of Intrusion Analysis
90
- dd