security+10
問題一覧
1
The MRl vendor does not support newer versions of the OS.
2
GDPR
3
Brute-force
4
Corrective
5
IPSec, SSL VPN
6
Reputation damage
7
SaaS
8
Packet capture
9
Time stamps, Time offset
10
Mandatory
11
Remote wipe
12
Data controller
13
Manually review the secure configuration guide checklists
14
SIEM
15
Modify the exception list on the DLP to allow the upload
16
Key exchange
17
nmap
18
Perform a quarterly audit of all user accounts that have been granted access and verify the exceptions with the
19
System log
20
PGP
21
a PUP
22
Third-party applications are not being patched.
23
Trojan
24
Privilege escalation
25
Time-based one-time password, Hardware token
26
A PowerShell code is performing a DLL injection.
27
Retina
28
White team
29
SLA
30
MAC filtering
31
Use the latest version of software, Implement a screened subnet for the web server, Install an endpoint security solution
32
A packet capture tool was used to steal the password
33
Salting
34
Communication plan
35
Data steward
36
Bluejacking
37
Something you are
38
Access control vestibules
39
Keylogger
40
NAC
41
SQLİ
42
SWG
43
A denial-of-service attack by disassociation is occurring.
44
biometric scanner
45
theHarvester
46
MAC flooding
47
Deploying an appropriately sized, network-connected UPS device
48
Multipath
49
Standard naming convention policy
50
The CSIRT thinks an insider threat is attacking the network.
51
ldentification
52
MTBF
53
False rejection
54
MAC flooding on fa0/2 port
55
Outsourced code development
56
Disaster recovery plan
57
Community
58
SSL stripping
59
Data owner
60
Uninterruptible power supplies with battery backup
61
an authentication application
62
SSH key
63
Devices with cellular communication capabiltes bypass traditional network security controls
64
Input validation
65
Configuring a service account to run the processes
66
Resource policies
67
OWASP
68
cat var/messages | grep 10.1.1.1
69
Rogue access point
70
Lessons learned
71
User-agent spoofing
72
Jump server
73
Lessons learned
74
Threat feeds
75
Tabletop
76
Cold site
77
Cuckoo
78
Provisioning
79
Load balancing
80
Round-robin
81
Correlation dashboards
82
Data processor
83
Watering-hole attack
84
Image volatile memory
85
Input validation
86
Ensuring that port 53 has been explicitly allowed in the rule set
87
Sensitive
88
Patch availability
89
access-list inbound deny ip source 10.1.4.9/32 destination 0.0.0.0/0
90
Preparation
91
Brute-force attack
92
Honeypot
93
Internet proxy
94
DD0S
95
Security information and event management
96
Data masking
97
Reputation damage
98
Tainted training data
99
Someone near the building is jamming the signal.
100
Least privilege
security+1
security+1
lopkeda · 100問 · 2年前security+1
security+1
100問 • 2年前security+2
security+2
lopkeda · 100問 · 2年前security+2
security+2
100問 • 2年前security+6
security+6
lopkeda · 100問 · 2年前security+6
security+6
100問 • 2年前security+7
security+7
lopkeda · 100問 · 2年前security+7
security+7
100問 • 2年前security+8
security+8
lopkeda · 100問 · 2年前security+8
security+8
100問 • 2年前security+9
security+9
lopkeda · 100問 · 2年前security+9
security+9
100問 • 2年前security+11
security+11
lopkeda · 100問 · 2年前security+11
security+11
100問 • 2年前security+12
security+12
lopkeda · 64問 · 2年前security+12
security+12
64問 • 2年前cysa+1
cysa+1
lopkeda · 100問 · 2年前cysa+1
cysa+1
100問 • 2年前cysa+2
cysa+2
lopkeda · 100問 · 2年前cysa+2
cysa+2
100問 • 2年前cysa+3
cysa+3
lopkeda · 54問 · 1年前cysa+3
cysa+3
54問 • 1年前A+1
A+1
lopkeda · 100問 · 1年前A+1
A+1
100問 • 1年前問題一覧
1
The MRl vendor does not support newer versions of the OS.
2
GDPR
3
Brute-force
4
Corrective
5
IPSec, SSL VPN
6
Reputation damage
7
SaaS
8
Packet capture
9
Time stamps, Time offset
10
Mandatory
11
Remote wipe
12
Data controller
13
Manually review the secure configuration guide checklists
14
SIEM
15
Modify the exception list on the DLP to allow the upload
16
Key exchange
17
nmap
18
Perform a quarterly audit of all user accounts that have been granted access and verify the exceptions with the
19
System log
20
PGP
21
a PUP
22
Third-party applications are not being patched.
23
Trojan
24
Privilege escalation
25
Time-based one-time password, Hardware token
26
A PowerShell code is performing a DLL injection.
27
Retina
28
White team
29
SLA
30
MAC filtering
31
Use the latest version of software, Implement a screened subnet for the web server, Install an endpoint security solution
32
A packet capture tool was used to steal the password
33
Salting
34
Communication plan
35
Data steward
36
Bluejacking
37
Something you are
38
Access control vestibules
39
Keylogger
40
NAC
41
SQLİ
42
SWG
43
A denial-of-service attack by disassociation is occurring.
44
biometric scanner
45
theHarvester
46
MAC flooding
47
Deploying an appropriately sized, network-connected UPS device
48
Multipath
49
Standard naming convention policy
50
The CSIRT thinks an insider threat is attacking the network.
51
ldentification
52
MTBF
53
False rejection
54
MAC flooding on fa0/2 port
55
Outsourced code development
56
Disaster recovery plan
57
Community
58
SSL stripping
59
Data owner
60
Uninterruptible power supplies with battery backup
61
an authentication application
62
SSH key
63
Devices with cellular communication capabiltes bypass traditional network security controls
64
Input validation
65
Configuring a service account to run the processes
66
Resource policies
67
OWASP
68
cat var/messages | grep 10.1.1.1
69
Rogue access point
70
Lessons learned
71
User-agent spoofing
72
Jump server
73
Lessons learned
74
Threat feeds
75
Tabletop
76
Cold site
77
Cuckoo
78
Provisioning
79
Load balancing
80
Round-robin
81
Correlation dashboards
82
Data processor
83
Watering-hole attack
84
Image volatile memory
85
Input validation
86
Ensuring that port 53 has been explicitly allowed in the rule set
87
Sensitive
88
Patch availability
89
access-list inbound deny ip source 10.1.4.9/32 destination 0.0.0.0/0
90
Preparation
91
Brute-force attack
92
Honeypot
93
Internet proxy
94
DD0S
95
Security information and event management
96
Data masking
97
Reputation damage
98
Tainted training data
99
Someone near the building is jamming the signal.
100
Least privilege