CNL_CH_5
問題一覧
1
Shimming
2
USB data blocker
3
Logic bomb
4
Memory leak
5
Unknown backdoor
6
USB data blocker
7
ARAT
8
DLP
9
Blocking removable-media devices and write capabilities using a host-based security tool
10
A USB data blocker
11
DLP
12
Removable media
13
Logic bomb
14
Resource exhaustion
15
Corporate PCs have been turned into a botnet
16
Macro-enabled file
17
DLP
18
DLP
19
Keylogger
20
Drive encryption, USB blocker
21
Rootkit
22
Privilege escalation - account
23
arbitrary code execution.
24
Supply chain
25
Logic bomb
26
No patches are available for the web browser
27
International operations
28
Data loss prevention
29
Logic bomb
30
HIPS
31
DLP
32
Integration and auditing
33
TPM
34
DLP
35
Keylogger
36
NIC teaming
37
Round-robin
38
HIDS
39
Privilege escalation
40
Configure DLP solutions
41
CASB
42
DLP
43
Configure the DLP policies to whitelist this application with the specific PII
44
HIDS (Host-based intrusion detection system)
45
Network DLP solution
46
SED (Self Encrypting Drive)
47
FDE
48
DLP
49
The end user purchased and installed a PUP (potentially unwanted programs) from a web browser
50
A RAT was installed and is transferring additional exploit tools.
51
The driver has malware installed and was refactored upon download to avoid detection.
52
Keylogger
53
Removable media control
54
DoS, Memory leak
55
PowerShell
56
Command and control
57
Measured boot
58
Default settings
59
The vendor has not supplied a patch for the appliance.
60
Modify the exception list on the DLP to allow the upload
61
Implementing a GPO that will restrict access to authorized USB removable media and regularly verifying that it is enforced
62
Surveillance systems
63
Classify the data
64
Classification
65
Buffer overflow
66
MAC flooding on Fa0/2 port
67
On-path attack
68
in monitoring mode.
69
Input validation
70
Keylogger
71
Directory traversal
72
DLP
73
FDE
74
TPM
75
A fileless virus that is contained on a vCard that is attempting to execute an attack
76
Application whitelisting
77
Application whitelisting
78
Enforce application whitelisting.
79
Firewall rules
80
Disable the built-in OS utilities as long as they are not needed for functionality.
81
Buffer overflow
82
Data is being exfiltrated.
83
DLP
CNL_CH_1
CNL_CH_1
Son Cagrı · 3回閲覧 · 185問 · 2年前CNL_CH_1
CNL_CH_1
3回閲覧 • 185問 • 2年前CNL_CH_2
CNL_CH_2
Son Cagrı · 109問 · 2年前CNL_CH_2
CNL_CH_2
109問 • 2年前CNL_CH_3
CNL_CH_3
Son Cagrı · 90問 · 2年前CNL_CH_3
CNL_CH_3
90問 • 2年前CNL_CH_4
CNL_CH_4
Son Cagrı · 48問 · 2年前CNL_CH_4
CNL_CH_4
48問 • 2年前CNL_CH_6
CNL_CH_6
Son Cagrı · 100問 · 2年前CNL_CH_6
CNL_CH_6
100問 • 2年前CNL_CH_7
CNL_CH_7
Son Cagrı · 43問 · 2年前CNL_CH_7
CNL_CH_7
43問 • 2年前CNL_CH_8
CNL_CH_8
Son Cagrı · 66問 · 2年前CNL_CH_8
CNL_CH_8
66問 • 2年前CNL_CH_9
CNL_CH_9
Son Cagrı · 49問 · 2年前CNL_CH_9
CNL_CH_9
49問 • 2年前CNL_CH_10
CNL_CH_10
Son Cagrı · 75問 · 2年前CNL_CH_10
CNL_CH_10
75問 • 2年前CNL_CH_11
CNL_CH_11
Son Cagrı · 118問 · 2年前CNL_CH_11
CNL_CH_11
118問 • 2年前CNL_CH_12
CNL_CH_12
Son Cagrı · 124問 · 2年前CNL_CH_12
CNL_CH_12
124問 • 2年前CNL_CH_13
CNL_CH_13
Son Cagrı · 95問 · 2年前CNL_CH_13
CNL_CH_13
95問 • 2年前21 Mayis
21 Mayis
Son Cagrı · 69問 · 1年前21 Mayis
21 Mayis
69問 • 1年前20 Mayis -175-
20 Mayis -175-
Son Cagrı · 174問 · 1年前20 Mayis -175-
20 Mayis -175-
174問 • 1年前30 Mayis
30 Mayis
Son Cagrı · 209問 · 1年前30 Mayis
30 Mayis
209問 • 1年前A-1
A-1
Son Cagrı · 216問 · 1年前A-1
A-1
216問 • 1年前A-2
A-2
Son Cagrı · 184問 · 1年前A-2
A-2
184問 • 1年前A-3
A-3
Son Cagrı · 68問 · 1年前A-3
A-3
68問 • 1年前exam topics
exam topics
Son Cagrı · 306問 · 1年前exam topics
exam topics
306問 • 1年前pass4future
pass4future
Son Cagrı · 330問 · 1年前pass4future
pass4future
330問 • 1年前son 1
son 1
Son Cagrı · 349問 · 1年前son 1
son 1
349問 • 1年前son 2
son 2
Son Cagrı · 113問 · 1年前son 2
son 2
113問 • 1年前son 3
son 3
Son Cagrı · 63問 · 1年前son 3
son 3
63問 • 1年前問題一覧
1
Shimming
2
USB data blocker
3
Logic bomb
4
Memory leak
5
Unknown backdoor
6
USB data blocker
7
ARAT
8
DLP
9
Blocking removable-media devices and write capabilities using a host-based security tool
10
A USB data blocker
11
DLP
12
Removable media
13
Logic bomb
14
Resource exhaustion
15
Corporate PCs have been turned into a botnet
16
Macro-enabled file
17
DLP
18
DLP
19
Keylogger
20
Drive encryption, USB blocker
21
Rootkit
22
Privilege escalation - account
23
arbitrary code execution.
24
Supply chain
25
Logic bomb
26
No patches are available for the web browser
27
International operations
28
Data loss prevention
29
Logic bomb
30
HIPS
31
DLP
32
Integration and auditing
33
TPM
34
DLP
35
Keylogger
36
NIC teaming
37
Round-robin
38
HIDS
39
Privilege escalation
40
Configure DLP solutions
41
CASB
42
DLP
43
Configure the DLP policies to whitelist this application with the specific PII
44
HIDS (Host-based intrusion detection system)
45
Network DLP solution
46
SED (Self Encrypting Drive)
47
FDE
48
DLP
49
The end user purchased and installed a PUP (potentially unwanted programs) from a web browser
50
A RAT was installed and is transferring additional exploit tools.
51
The driver has malware installed and was refactored upon download to avoid detection.
52
Keylogger
53
Removable media control
54
DoS, Memory leak
55
PowerShell
56
Command and control
57
Measured boot
58
Default settings
59
The vendor has not supplied a patch for the appliance.
60
Modify the exception list on the DLP to allow the upload
61
Implementing a GPO that will restrict access to authorized USB removable media and regularly verifying that it is enforced
62
Surveillance systems
63
Classify the data
64
Classification
65
Buffer overflow
66
MAC flooding on Fa0/2 port
67
On-path attack
68
in monitoring mode.
69
Input validation
70
Keylogger
71
Directory traversal
72
DLP
73
FDE
74
TPM
75
A fileless virus that is contained on a vCard that is attempting to execute an attack
76
Application whitelisting
77
Application whitelisting
78
Enforce application whitelisting.
79
Firewall rules
80
Disable the built-in OS utilities as long as they are not needed for functionality.
81
Buffer overflow
82
Data is being exfiltrated.
83
DLP