cysa+1
問題一覧
1
Validation
2
New account introduced
3
Single pane of glass
4
p4wnp1_aloa.lan (192.168.86.56)
5
Secure the scene
6
All new employees must sign a user agreement to acknowledge the company security policy
7
Information sharing organization
8
To identify areas of improvement in the incident response process
9
TSpirit: Cobain: Yes Grohl: Yes Novo: Yes Smear: No Channing: No
10
Insider Threat
11
Take a snapshot of the compromised server and verify its integrity
12
Running processes
13
function y() { dig $(dig x $1 | grep PTR | tail -n 1 | awk -F ".in-addr" {print $1}).origin.asn.cymru.com TXT +short}
14
function x() { info-$(geoiplookup $1) && echo "$1 | Sinfo" }
15
Perform proper sanitization on all fields
16
CVSS:31/AV:N/AC:L/PR:N/UI:N/S:U/C:H/l:H/A:L
17
DLP
18
Block requests without an X-Frame-Options header
19
Affected hosts, Risk score
20
A mean time to respond of 15 days
21
PowerShell
22
An on-path attack is being performed by someone with internal access that forces users into port 80
23
SLA
24
Command and control
25
Agent-based
26
Reverse Shell
27
Weaponization
28
54.74.110.228
29
Name: CAP.SHIELD - CVSS 3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/:N/A:N External System
30
Disaster recovery plan
31
Deploy a CASB and enable policy enforcement
32
DNS
33
Exploitation
34
Reconnaissance
35
Social engineering attack, Obfuscated links
36
Use application security scanning as part of the pipeline for the CI/CD flow
37
Proprietary systems
38
Agent-based scanning
39
function x() { info=$(dig $(dig -x $1 | grep PTR | tail -n 1 | awk -F ".in-addr" {print $1} ).origin.asn.cymru.com TXT +short) && echo "$1 | $info" }
40
Improve employee training and awareness
41
Determine the sophistication of the audience that the report is meant for
42
Upload the binary to an air gapped sandbox for analysis
43
SOAR
44
Avoid
45
ldentify any improvements or changes in the incident response plan or procedures
46
Single pane of glass
47
MITRE ATT&CK
48
The vulnerable parameter and characters > and " with a reflected XSS attempt
49
Schedule a review with all teams to discuss what occurred
50
Reverse engineering
51
Malicious files
52
Email header analysis: -Check the email header for a phishing confidence metric greater than or equal to five -Add the domain of sender to the block list -Move the email to quarantine
53
Card issuer
54
Mean time to detect
55
Cloud-specific misconfigurations may not be detected by the current scanners
56
Ensure that the case details do not reflect any user-identifiable information Password protect the evidence and restrict access to personnel related to the investigation
57
Agree on the goals and objectives of the plan
58
The lead should review what is documented in the incident response policy or plan
59
Indicators of compromise
60
Beaconing
61
Change the display filter to ftp-data and follow the TCP streams
62
Eradication
63
Perform no action until HR or legal counsel advises on next steps
64
Reduce the administrator and privileged access accounts
65
Clone the virtual server for forensic analysis
66
C2 beaconing activity
67
Static analysis
68
threat hunting.
69
To create data classification, risk assessments, security control reviews, and contingency planning
70
Technical control
71
parameterize
72
The host downloaded an application from utoftor.com.
73
User 2
74
Look at attacks against similar industry peers and assess the probability of the same attacks happening.
75
To provide hardware-based security features using unique keys
76
Consult the communications plan
77
Application fuzzing
78
Deployment of a jump box to allow access to the laboratory network and use of VDl in persistent mode to provide the necessary tools for analysis
79
To establish a clear chain of command, To meet regulatory requirements for timely reporting
80
The testing is outside the contractual scope
81
Understanding security software technologies
82
Uninstall the DNS service, Disable the Telnet service
83
A computing device that manages digital keys, performs encryption/decryption functions, and maintains other cryptographic functions
84
The IDS signature
85
The disclosure section should contain the organization's legal and regulatory requirements the incident regarding disclosures.
86
CAN bus
87
File carving
88
diff daily_11_03_2019 daily_11_04_2019
89
The DMARC record's policy tag is incorrectly configured.
90
Trusted firmware updates provide organizations with secure code signing, distribution, installation, and attestation for embedded devices.
91
Prepare an incident summary report.
92
Block the download of the file via the web proxy.
93
Create a proper DMZ for outdated components and segregate the JBoss server.
94
Company leadership
95
Fully segregate the affected servers physically in a network segment, apart from the production network.
96
Full disk encrypted, Air gapped
97
To identify likely attack scenarios within an organization
98
Delete BusinessUsr access key 1.
99
Replace the strcpy function.
100
Data management policy
security+1
security+1
lopkeda · 100問 · 2年前security+1
security+1
100問 • 2年前security+2
security+2
lopkeda · 100問 · 2年前security+2
security+2
100問 • 2年前security+6
security+6
lopkeda · 100問 · 2年前security+6
security+6
100問 • 2年前security+7
security+7
lopkeda · 100問 · 2年前security+7
security+7
100問 • 2年前security+8
security+8
lopkeda · 100問 · 2年前security+8
security+8
100問 • 2年前security+9
security+9
lopkeda · 100問 · 2年前security+9
security+9
100問 • 2年前security+10
security+10
lopkeda · 100問 · 2年前security+10
security+10
100問 • 2年前security+11
security+11
lopkeda · 100問 · 2年前security+11
security+11
100問 • 2年前security+12
security+12
lopkeda · 64問 · 2年前security+12
security+12
64問 • 2年前cysa+2
cysa+2
lopkeda · 100問 · 2年前cysa+2
cysa+2
100問 • 2年前cysa+3
cysa+3
lopkeda · 54問 · 1年前cysa+3
cysa+3
54問 • 1年前A+1
A+1
lopkeda · 100問 · 1年前A+1
A+1
100問 • 1年前問題一覧
1
Validation
2
New account introduced
3
Single pane of glass
4
p4wnp1_aloa.lan (192.168.86.56)
5
Secure the scene
6
All new employees must sign a user agreement to acknowledge the company security policy
7
Information sharing organization
8
To identify areas of improvement in the incident response process
9
TSpirit: Cobain: Yes Grohl: Yes Novo: Yes Smear: No Channing: No
10
Insider Threat
11
Take a snapshot of the compromised server and verify its integrity
12
Running processes
13
function y() { dig $(dig x $1 | grep PTR | tail -n 1 | awk -F ".in-addr" {print $1}).origin.asn.cymru.com TXT +short}
14
function x() { info-$(geoiplookup $1) && echo "$1 | Sinfo" }
15
Perform proper sanitization on all fields
16
CVSS:31/AV:N/AC:L/PR:N/UI:N/S:U/C:H/l:H/A:L
17
DLP
18
Block requests without an X-Frame-Options header
19
Affected hosts, Risk score
20
A mean time to respond of 15 days
21
PowerShell
22
An on-path attack is being performed by someone with internal access that forces users into port 80
23
SLA
24
Command and control
25
Agent-based
26
Reverse Shell
27
Weaponization
28
54.74.110.228
29
Name: CAP.SHIELD - CVSS 3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/:N/A:N External System
30
Disaster recovery plan
31
Deploy a CASB and enable policy enforcement
32
DNS
33
Exploitation
34
Reconnaissance
35
Social engineering attack, Obfuscated links
36
Use application security scanning as part of the pipeline for the CI/CD flow
37
Proprietary systems
38
Agent-based scanning
39
function x() { info=$(dig $(dig -x $1 | grep PTR | tail -n 1 | awk -F ".in-addr" {print $1} ).origin.asn.cymru.com TXT +short) && echo "$1 | $info" }
40
Improve employee training and awareness
41
Determine the sophistication of the audience that the report is meant for
42
Upload the binary to an air gapped sandbox for analysis
43
SOAR
44
Avoid
45
ldentify any improvements or changes in the incident response plan or procedures
46
Single pane of glass
47
MITRE ATT&CK
48
The vulnerable parameter and characters > and " with a reflected XSS attempt
49
Schedule a review with all teams to discuss what occurred
50
Reverse engineering
51
Malicious files
52
Email header analysis: -Check the email header for a phishing confidence metric greater than or equal to five -Add the domain of sender to the block list -Move the email to quarantine
53
Card issuer
54
Mean time to detect
55
Cloud-specific misconfigurations may not be detected by the current scanners
56
Ensure that the case details do not reflect any user-identifiable information Password protect the evidence and restrict access to personnel related to the investigation
57
Agree on the goals and objectives of the plan
58
The lead should review what is documented in the incident response policy or plan
59
Indicators of compromise
60
Beaconing
61
Change the display filter to ftp-data and follow the TCP streams
62
Eradication
63
Perform no action until HR or legal counsel advises on next steps
64
Reduce the administrator and privileged access accounts
65
Clone the virtual server for forensic analysis
66
C2 beaconing activity
67
Static analysis
68
threat hunting.
69
To create data classification, risk assessments, security control reviews, and contingency planning
70
Technical control
71
parameterize
72
The host downloaded an application from utoftor.com.
73
User 2
74
Look at attacks against similar industry peers and assess the probability of the same attacks happening.
75
To provide hardware-based security features using unique keys
76
Consult the communications plan
77
Application fuzzing
78
Deployment of a jump box to allow access to the laboratory network and use of VDl in persistent mode to provide the necessary tools for analysis
79
To establish a clear chain of command, To meet regulatory requirements for timely reporting
80
The testing is outside the contractual scope
81
Understanding security software technologies
82
Uninstall the DNS service, Disable the Telnet service
83
A computing device that manages digital keys, performs encryption/decryption functions, and maintains other cryptographic functions
84
The IDS signature
85
The disclosure section should contain the organization's legal and regulatory requirements the incident regarding disclosures.
86
CAN bus
87
File carving
88
diff daily_11_03_2019 daily_11_04_2019
89
The DMARC record's policy tag is incorrectly configured.
90
Trusted firmware updates provide organizations with secure code signing, distribution, installation, and attestation for embedded devices.
91
Prepare an incident summary report.
92
Block the download of the file via the web proxy.
93
Create a proper DMZ for outdated components and segregate the JBoss server.
94
Company leadership
95
Fully segregate the affected servers physically in a network segment, apart from the production network.
96
Full disk encrypted, Air gapped
97
To identify likely attack scenarios within an organization
98
Delete BusinessUsr access key 1.
99
Replace the strcpy function.
100
Data management policy