問題一覧
1
- Partial, - Risk Informed, - Repeatable, - Adaptive
2
- Machine Learning ( M.L. )
3
- Artificial Intelligence ( A.I. )
4
- Deep Learning ( D.L. )
5
- The Generative Adversarial Network:
6
- To ensure that forensic software and tools cannot change a drive inadvertently by accessing it.
7
- Is to intercept and prevent (or 'block') any modifying command operation from ever reaching the storage device.
8
- To copy a drive and validates that it matches the original drive but cannot be used by itself during analysis.
9
- Is used to wipe magnetic media.
10
- Actions and Objectives
11
- Involves maintaining communication with the compromised system, not fulfilling the adversary's intent
12
- Involves gathering information about the target system, not fulfilling the adversary's intent.
13
- Involves creating a malicious payload, not fulfilling the adversary's intent.
14
- Lessons learned
15
- Incident Response Plan
16
- Root Cause Analysis
17
- Forensic Analysis
18
- Collection
19
- Analysis
20
- Feedback
21
- Dissemination
22
- Zone transfers
23
- D.N.S.S.E.C.
24
- D.N.S. Registration
25
- CNAME
26
- S.Q.L. Injection
27
- Cross-site scripting
28
- X.M.L. injection
29
- Directory traversal
30
- N.A.C.
31
- A.C.L.
32
- Mac Filtering
33
- S.P.F.
34
- MITRE ATT&CK
35
- Diamond Model of Intrusion Analysis
36
- OWASP Testing Guide
37
- Cyber Kill Chain
38
- A zone transfer
39
- A D.N.S. forward or reverse lookup
40
- Using maltego
41
- A whois query
42
- SandWorm attack
43
- Dirty COW
44
- Shellshock
45
- CVE-2018-8174
46
- Open Source Security Testing Methodology Manual (OSSTMM)
47
- MITRE ATT&CK
48
- Cyber Kill Chain
49
- Diamond Model of Intrusion Analysis
50
- AbuseIPDB
51
- Joe Sandbox
52
- Pattern Recognition
53
- SOAR
54
- Reconnaissance
55
- Delivery
56
- Exploitation
57
- Weaponization
58
- Infrastructure as a Service
59
- Function as a Service
60
- Software as a Service
61
- Platform as a Service
62
- Quality of service
63
- Audit log
64
- Honeypot
65
- NIPS
66
- SQL injection
67
- XML injection
68
- Header manipulation
69
- Cross-site scripting
70
- Anti-tamper
71
- Root of trust
72
- Trusted platform module
73
- Hardware security module
74
- Secure Software Development Life Cycle (SDLC)
75
- Waterfall Model
76
- Patch Management
77
- Agile Development
78
- Over-the-shoulder
79
- Pair programming
80
- Tool-assisted review
81
- Dual control
82
- Security, - Pre-EFI initialization, - Driver Execution Environment, - Boot Device Select, - Transient System Load, - Runtime
83
- Root cause analysis
84
- Incident response plan
85
- Lessons learned
86
- Forensic analysis
87
- Clear
88
- Purge
89
- Destroy
90
- Degauss
THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- Partial, - Risk Informed, - Repeatable, - Adaptive
2
- Machine Learning ( M.L. )
3
- Artificial Intelligence ( A.I. )
4
- Deep Learning ( D.L. )
5
- The Generative Adversarial Network:
6
- To ensure that forensic software and tools cannot change a drive inadvertently by accessing it.
7
- Is to intercept and prevent (or 'block') any modifying command operation from ever reaching the storage device.
8
- To copy a drive and validates that it matches the original drive but cannot be used by itself during analysis.
9
- Is used to wipe magnetic media.
10
- Actions and Objectives
11
- Involves maintaining communication with the compromised system, not fulfilling the adversary's intent
12
- Involves gathering information about the target system, not fulfilling the adversary's intent.
13
- Involves creating a malicious payload, not fulfilling the adversary's intent.
14
- Lessons learned
15
- Incident Response Plan
16
- Root Cause Analysis
17
- Forensic Analysis
18
- Collection
19
- Analysis
20
- Feedback
21
- Dissemination
22
- Zone transfers
23
- D.N.S.S.E.C.
24
- D.N.S. Registration
25
- CNAME
26
- S.Q.L. Injection
27
- Cross-site scripting
28
- X.M.L. injection
29
- Directory traversal
30
- N.A.C.
31
- A.C.L.
32
- Mac Filtering
33
- S.P.F.
34
- MITRE ATT&CK
35
- Diamond Model of Intrusion Analysis
36
- OWASP Testing Guide
37
- Cyber Kill Chain
38
- A zone transfer
39
- A D.N.S. forward or reverse lookup
40
- Using maltego
41
- A whois query
42
- SandWorm attack
43
- Dirty COW
44
- Shellshock
45
- CVE-2018-8174
46
- Open Source Security Testing Methodology Manual (OSSTMM)
47
- MITRE ATT&CK
48
- Cyber Kill Chain
49
- Diamond Model of Intrusion Analysis
50
- AbuseIPDB
51
- Joe Sandbox
52
- Pattern Recognition
53
- SOAR
54
- Reconnaissance
55
- Delivery
56
- Exploitation
57
- Weaponization
58
- Infrastructure as a Service
59
- Function as a Service
60
- Software as a Service
61
- Platform as a Service
62
- Quality of service
63
- Audit log
64
- Honeypot
65
- NIPS
66
- SQL injection
67
- XML injection
68
- Header manipulation
69
- Cross-site scripting
70
- Anti-tamper
71
- Root of trust
72
- Trusted platform module
73
- Hardware security module
74
- Secure Software Development Life Cycle (SDLC)
75
- Waterfall Model
76
- Patch Management
77
- Agile Development
78
- Over-the-shoulder
79
- Pair programming
80
- Tool-assisted review
81
- Dual control
82
- Security, - Pre-EFI initialization, - Driver Execution Environment, - Boot Device Select, - Transient System Load, - Runtime
83
- Root cause analysis
84
- Incident response plan
85
- Lessons learned
86
- Forensic analysis
87
- Clear
88
- Purge
89
- Destroy
90
- Degauss