Sec +
問題一覧
1
Organized Crime
2
Salting
3
Phishing
4
Access list outbound permit 0.0.0.0/0 0.0.0.0/0 port 53 Access list outbound deny 0.0.0.0/0 10.50.10.25/32 port 53
5
SSO
6
An employee receives a gift card request in an email that has a executive’s name in the display field of the email.
7
Jump Server
8
WAF
9
Multifactor authentication
10
Impersonation, Smishing
11
Add a smishing exercise to the annual company training., Issue a general email warning to the company.
12
A thorough analysis of the supply chain
13
Rules of engagement
14
Active
15
DRP
16
Side Loading
17
Secured zones
18
Jump server
19
http://
20
access-list inbound deny ip source 10.1.4.9/32 destination 0.0.0.0/0
21
Implementing a bastion host
22
Endpoint
23
Threat hunting
24
Transfer
25
Full disk
26
Preventive
27
Least privilege
28
Risk register
29
Change management procedure
30
Bug bounty
31
Nation-state
32
SQL injection
33
Intellectual property
34
If a security incident occurs on the device, the correct employee can be notified., Company data can be accounted for when the employee leaves the organization.
35
Modify the content of current training
36
Dashboard
37
A rootkit was deployed
38
Client
39
SOW
40
Input validation
41
Ease of recovery, Responsiveness
42
Create a change control request
43
To prevent future incidents of the same nature
44
Fines
45
Capacity planning
46
Geolocation policy
47
Firmware version
48
Testing the policy in a non-production environment before enabling the policy in the production network
49
Cold
50
Sanitization
51
Sensitive
52
Local data protection regulations
53
Application allow list
54
Red
55
Performing code signing on company-developed software
56
Honeypot
57
Analysis
58
Rescan the network
59
Insider threat
60
Non-repudiation
61
Automation
62
DLP
63
Imput validation
64
Update the EDR policies to block automatic execution of downloaded programs
65
Compensating control
66
Use provisioning script
67
Detective
68
Serverless framework
69
Tuning
70
Geographic dispersion
71
Jailbreaking
72
ARO
73
Reporting phishing attempts or other suspicious activities
74
Preparation
75
Web-based administration
76
FIM
77
Key escrow, TPM presence
78
Setting up a VPN and placing the jump server inside the firewall
79
IDS
80
Safety controls should fail open
81
Containers
82
E-discovery
83
Updating processes for sending wire transfers
84
Orchestration
85
Subject
86
Risk threshold
87
Data is being exfiltrated
88
Supply chain vendor
89
Zero trust
90
SQL injection
91
OCSP
92
Firmware
93
CVSS
94
Install endpoint management software on all systems
95
Data in transit
96
Segmentation
97
IPSec
98
Infrastructure as code
99
Social engineering
100
Apply classifications to the data
問題一覧
1
Organized Crime
2
Salting
3
Phishing
4
Access list outbound permit 0.0.0.0/0 0.0.0.0/0 port 53 Access list outbound deny 0.0.0.0/0 10.50.10.25/32 port 53
5
SSO
6
An employee receives a gift card request in an email that has a executive’s name in the display field of the email.
7
Jump Server
8
WAF
9
Multifactor authentication
10
Impersonation, Smishing
11
Add a smishing exercise to the annual company training., Issue a general email warning to the company.
12
A thorough analysis of the supply chain
13
Rules of engagement
14
Active
15
DRP
16
Side Loading
17
Secured zones
18
Jump server
19
http://
20
access-list inbound deny ip source 10.1.4.9/32 destination 0.0.0.0/0
21
Implementing a bastion host
22
Endpoint
23
Threat hunting
24
Transfer
25
Full disk
26
Preventive
27
Least privilege
28
Risk register
29
Change management procedure
30
Bug bounty
31
Nation-state
32
SQL injection
33
Intellectual property
34
If a security incident occurs on the device, the correct employee can be notified., Company data can be accounted for when the employee leaves the organization.
35
Modify the content of current training
36
Dashboard
37
A rootkit was deployed
38
Client
39
SOW
40
Input validation
41
Ease of recovery, Responsiveness
42
Create a change control request
43
To prevent future incidents of the same nature
44
Fines
45
Capacity planning
46
Geolocation policy
47
Firmware version
48
Testing the policy in a non-production environment before enabling the policy in the production network
49
Cold
50
Sanitization
51
Sensitive
52
Local data protection regulations
53
Application allow list
54
Red
55
Performing code signing on company-developed software
56
Honeypot
57
Analysis
58
Rescan the network
59
Insider threat
60
Non-repudiation
61
Automation
62
DLP
63
Imput validation
64
Update the EDR policies to block automatic execution of downloaded programs
65
Compensating control
66
Use provisioning script
67
Detective
68
Serverless framework
69
Tuning
70
Geographic dispersion
71
Jailbreaking
72
ARO
73
Reporting phishing attempts or other suspicious activities
74
Preparation
75
Web-based administration
76
FIM
77
Key escrow, TPM presence
78
Setting up a VPN and placing the jump server inside the firewall
79
IDS
80
Safety controls should fail open
81
Containers
82
E-discovery
83
Updating processes for sending wire transfers
84
Orchestration
85
Subject
86
Risk threshold
87
Data is being exfiltrated
88
Supply chain vendor
89
Zero trust
90
SQL injection
91
OCSP
92
Firmware
93
CVSS
94
Install endpoint management software on all systems
95
Data in transit
96
Segmentation
97
IPSec
98
Infrastructure as code
99
Social engineering
100
Apply classifications to the data