問題一覧
1
- Mandatory vacations
2
- Separation of duties
3
- Dual control
4
- Least privilege
5
- FISMA
6
- COPPA
7
- SOX
8
- HIPPA
9
- White team
10
- Purple team
11
- Blue team
12
- Red team
13
- Diamond Model of Intrusion Analysis
14
- Cyber Kill Chain
15
- OWASP Testing Guide
16
- MITRE ATT&CK
17
- dd
18
- dd
19
- rm
20
- wget
21
- Attack surface
22
- Threat model
23
- Attack vector
24
- Adversary capability set
25
- ScoutSuite
26
- Prowler
27
- OpenVAS
28
- Pacu
29
- Diamond Model of Intrusion Analysis
30
- Open I.O.C.
31
- MITRE ATT&CK framework
32
- Lockheed Martin cyber kill chain
33
- Output encoding
34
- Error handling
35
- Input validation
36
- Session management
37
- Service provider ( S.P. )
38
- Relying party ( R.P. )
39
- Identity provider (IdP)
40
- Single sign-on (SSO)
41
- ESTABLISHED
42
- CLOSE_WAIT
43
- LAST_ACK
44
- LISTENING
45
- Behavior
46
- Heuristic
47
- Anomaly
48
- Trend
49
- Procedures
50
- Policies
51
- Guidelines
52
- Framework
53
- Full packet capture
54
- Net flow capture
55
- Software design documentation review
56
- SIEM event log monitoring
57
- CPU registers and cache memory (L1/L2/L3/GPU), - The contents of system memory (RAM), including a routing table, ARP cache, process tables, kernel statistics, and temporary file systems/swap space/virtual memory., - Collection of data storage devices like hard drives, SSDs, and flash memory devices., - Backup tapes, external media devices (hard drives, DVDs, etc.), and even configuration data or network diagrams
58
- Cross-Site Scripting (XSS)
59
- Spectre Attack
60
- Poodle Attack
61
- SolarWinds SUNBURST Attack
62
- Injection Attacks
63
- Ghostcat
64
- F5 BIG-IP Traffic Management User Interface (TMUI) Remote Code Execution Vulnerability
65
- Shattered Attack
66
- Diamond Model of Intrusion Analysis
67
- MITRE ATT&CK
68
- OSS TMM
69
- Cyber Kill Chain
70
- Capability
71
- Adversary
72
- Infrastructure
73
- Victim
74
- Adversary
75
- Infrastructure
76
- Victim
77
- Capability
78
- Forensic analysis
79
- Root cause analysis
80
- Incident response plan
81
- Lessons learned
82
- MS17-010
83
- MS16-120
84
- MS17-011
85
- MS16-098
86
- tcpdump
87
- Ping
88
- Wireshark
89
- Nmap
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- Mandatory vacations
2
- Separation of duties
3
- Dual control
4
- Least privilege
5
- FISMA
6
- COPPA
7
- SOX
8
- HIPPA
9
- White team
10
- Purple team
11
- Blue team
12
- Red team
13
- Diamond Model of Intrusion Analysis
14
- Cyber Kill Chain
15
- OWASP Testing Guide
16
- MITRE ATT&CK
17
- dd
18
- dd
19
- rm
20
- wget
21
- Attack surface
22
- Threat model
23
- Attack vector
24
- Adversary capability set
25
- ScoutSuite
26
- Prowler
27
- OpenVAS
28
- Pacu
29
- Diamond Model of Intrusion Analysis
30
- Open I.O.C.
31
- MITRE ATT&CK framework
32
- Lockheed Martin cyber kill chain
33
- Output encoding
34
- Error handling
35
- Input validation
36
- Session management
37
- Service provider ( S.P. )
38
- Relying party ( R.P. )
39
- Identity provider (IdP)
40
- Single sign-on (SSO)
41
- ESTABLISHED
42
- CLOSE_WAIT
43
- LAST_ACK
44
- LISTENING
45
- Behavior
46
- Heuristic
47
- Anomaly
48
- Trend
49
- Procedures
50
- Policies
51
- Guidelines
52
- Framework
53
- Full packet capture
54
- Net flow capture
55
- Software design documentation review
56
- SIEM event log monitoring
57
- CPU registers and cache memory (L1/L2/L3/GPU), - The contents of system memory (RAM), including a routing table, ARP cache, process tables, kernel statistics, and temporary file systems/swap space/virtual memory., - Collection of data storage devices like hard drives, SSDs, and flash memory devices., - Backup tapes, external media devices (hard drives, DVDs, etc.), and even configuration data or network diagrams
58
- Cross-Site Scripting (XSS)
59
- Spectre Attack
60
- Poodle Attack
61
- SolarWinds SUNBURST Attack
62
- Injection Attacks
63
- Ghostcat
64
- F5 BIG-IP Traffic Management User Interface (TMUI) Remote Code Execution Vulnerability
65
- Shattered Attack
66
- Diamond Model of Intrusion Analysis
67
- MITRE ATT&CK
68
- OSS TMM
69
- Cyber Kill Chain
70
- Capability
71
- Adversary
72
- Infrastructure
73
- Victim
74
- Adversary
75
- Infrastructure
76
- Victim
77
- Capability
78
- Forensic analysis
79
- Root cause analysis
80
- Incident response plan
81
- Lessons learned
82
- MS17-010
83
- MS16-120
84
- MS17-011
85
- MS16-098
86
- tcpdump
87
- Ping
88
- Wireshark
89
- Nmap