問題一覧
1
3
2
- Base Metric Group, - Temporal Metric Group, - Environmental Metric Group
3
- Base Metric Group
4
- Exploitability Metric Group, - Impact Metric Group
5
- Attack Vector ( A.V. ), - Attack Complexity ( A.C. ), - Privileges Required ( P.R. ), - User Interaction ( U.I. )
6
- Confidentiality Impact ( C ), - Integrity Impact ( I ), - Availability Impact ( A )
7
Attack Vector ( A.V. ) :, - Network ( N ), - Adjacent ( A ), - Local ( L ), - Physical ( P )
8
Attack Complexity ( A.C. ) :, - Low ( L ) , - High ( H )
9
Privileges Required ( P.R. ) :, - None ( N ), - Low ( L ) , - High ( H )
10
User Interaction ( U.I. ) :, - None ( N ), - Required ( R )
11
Scope ( S ) :, - Unchanged ( U ), - Changed ( C )
12
Confidentiality Impact ( C ) :, - High ( H ), - Low ( L ), - None ( N )
13
Integrity Impact ( I ) :, - High ( H ) , - Low ( L ), - None ( N )
14
Availability Impact ( A ) :, - High ( H ), - Low ( L ) , - None ( N )
15
Exploit Code Maturity ( E ) :, - Not Defined ( X ), - High ( H ), - Functional ( F ) , - Proof-of-Concept ( P ), - Unproven ( U )
16
Remediation Level ( R.L. ) :, - Not Defined ( X ), - Unavailable ( U ), - Workaround ( W ) , - Temporary Fix ( T ), - Official Fix ( O )
17
Report Confidence ( R.C. ) :, - Not Defined ( X ) , - Confirmed ( C ) , - Reasonable ( R ) , - Unknown ( U )
18
Security Requirements ( C.R. , I.R. , A.R. ) :, - Not Defined ( X ), - High ( H ), - Medium ( M ) , - Low ( L )
19
Modified Base Metric, - Modified Attack Vector ( M.A.V. ), - Modified Attack Complexity ( M.A.C. ), - Modified Privileges Required ( M.P.R. ), - Modified User Interaction ( M.U.I. ), - Modified Scope ( M.S. ), - Modified Confidentiality ( M.C. ), - Modified Integrity ( M.I. ), - Modified Availability ( M.A. )
20
0.0
21
0.1 - 3.9
22
4.0 - 6.9
23
7.0 - 8.9
24
9.0 - 10.0
25
- A vulnerability with Base metric values of, , - “Attack Vector: Network, , - Attack Complexity: Low,, - Privileges Required: High,, - User Interaction: None, , - Scope: Unchanged, , - Confidentiality: Low, , - Integrity: Low, , - Availability: None” , - and no specified Temporal or Environmental metrics
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
3
2
- Base Metric Group, - Temporal Metric Group, - Environmental Metric Group
3
- Base Metric Group
4
- Exploitability Metric Group, - Impact Metric Group
5
- Attack Vector ( A.V. ), - Attack Complexity ( A.C. ), - Privileges Required ( P.R. ), - User Interaction ( U.I. )
6
- Confidentiality Impact ( C ), - Integrity Impact ( I ), - Availability Impact ( A )
7
Attack Vector ( A.V. ) :, - Network ( N ), - Adjacent ( A ), - Local ( L ), - Physical ( P )
8
Attack Complexity ( A.C. ) :, - Low ( L ) , - High ( H )
9
Privileges Required ( P.R. ) :, - None ( N ), - Low ( L ) , - High ( H )
10
User Interaction ( U.I. ) :, - None ( N ), - Required ( R )
11
Scope ( S ) :, - Unchanged ( U ), - Changed ( C )
12
Confidentiality Impact ( C ) :, - High ( H ), - Low ( L ), - None ( N )
13
Integrity Impact ( I ) :, - High ( H ) , - Low ( L ), - None ( N )
14
Availability Impact ( A ) :, - High ( H ), - Low ( L ) , - None ( N )
15
Exploit Code Maturity ( E ) :, - Not Defined ( X ), - High ( H ), - Functional ( F ) , - Proof-of-Concept ( P ), - Unproven ( U )
16
Remediation Level ( R.L. ) :, - Not Defined ( X ), - Unavailable ( U ), - Workaround ( W ) , - Temporary Fix ( T ), - Official Fix ( O )
17
Report Confidence ( R.C. ) :, - Not Defined ( X ) , - Confirmed ( C ) , - Reasonable ( R ) , - Unknown ( U )
18
Security Requirements ( C.R. , I.R. , A.R. ) :, - Not Defined ( X ), - High ( H ), - Medium ( M ) , - Low ( L )
19
Modified Base Metric, - Modified Attack Vector ( M.A.V. ), - Modified Attack Complexity ( M.A.C. ), - Modified Privileges Required ( M.P.R. ), - Modified User Interaction ( M.U.I. ), - Modified Scope ( M.S. ), - Modified Confidentiality ( M.C. ), - Modified Integrity ( M.I. ), - Modified Availability ( M.A. )
20
0.0
21
0.1 - 3.9
22
4.0 - 6.9
23
7.0 - 8.9
24
9.0 - 10.0
25
- A vulnerability with Base metric values of, , - “Attack Vector: Network, , - Attack Complexity: Low,, - Privileges Required: High,, - User Interaction: None, , - Scope: Unchanged, , - Confidentiality: Low, , - Integrity: Low, , - Availability: None” , - and no specified Temporal or Environmental metrics