問題一覧
1
- Use a packet sniffer to monitor network traffic for signs of exploitation. | + |, - Use a network scanner to scan the network for hosts that are running vulnerable software. | + |, - Use a vulnerability scanner to scan the system for known vulnerabilities. | + |
2
- A TCP SYN scan | + |
3
- Automate the tasks using scripting or a SOAR platform. | + |
4
- 172.16.1.3, 192.168.1.12, 445, TCP, ALLOW | + |
5
- Lockheed Martin cyber kill chain | + |
6
- journalctl _UID=1003 | grep sudo
7
- tcpdump
8
- Debugging
9
- Insecure direct object reference
10
- PII of company employees and customers was exfiltrated
11
- OpenIOC
12
- Vulnerability scanning
13
- Patching
14
- SNMP
15
- Dissemination
16
- Forensic analysis
17
- Application blacklist
18
- Command Injection
19
- High
20
- Root cause analysis
21
- Authentication
22
- A malicious inbound TCP packet
23
- WAF
24
- OpenID Connect
25
- Continuous deployment
26
- The application is vulnerable to an XML External Entity attack
27
- Providing a knowledge base of tactics, techniques, and procedures used by attackers
28
- grep -i password logfile.log
29
- Unauthorized privileges are being utilized
30
- EternalBlue
31
- Wiping
32
- XCCDF
33
- Recurrence of the vulnerability
34
- The backup is a differential backup
35
- SCADA
36
- Development of a communication plan
37
- Passive
38
- Require biometric identification for user logins
39
- Human resource system
40
- Reconnaissance
41
- The attacker must have access to the local network that the system is connected to
42
- It provides a quantifiable measure of the vulnerability management program's effectiveness
43
- Transference
44
- Ask a member of law enforcement to meet with your employee
45
- Unauthorized softwar
46
- Degaussing
47
- Ensuring the safety and security of all personnel, - Prevention of an ongoing intrusion or data breach
48
- Change all devices and servers that support it to port 636 since encrypted services run by default on port 636
49
- Exploitation
50
- Management network
51
- Incident response report
52
- Data owner
53
- NAC
54
- Black box
55
- Leading to postponed or overlooked system updates and patches
56
- Alerting the incident response team and working with them to mitigate any potential harm
57
- Installation
58
- Any listed answers may be true
59
- DES
60
- Parameterized queries
61
- User authentication
62
- GLBA
63
- Get leadership concurrence on the scoping document
64
- Ensure that all each individual console has its own unique key for decrypting individual licenses and tracking which console has purchased which game
65
- Self-checking
66
- Your email server is running on a non-standard port
67
- strcpy could allow a buffer overflow to occur; upgrade the operating system to run ASLR to prevent a buffer overflow
68
- Directory traversal
69
- Banner grabbing and comparing response fingerprints
70
- Input validation
71
- Drupal 7.58/8.5.1
72
- Adversary
73
- Scan the network for additional instances of this vulnerability and patch the affected assets
74
- Infrastructure as Code (IaC)
75
- Insider threats
76
- Training
77
- Beaconing
78
- Implement compensating controls
79
- DLP
80
- Adversary
81
- Contact the service desk or incident response team to determine what to do next
82
- The MOU may limit their ability to identify and address vulnerabilities in the shared systems
83
- Jumpbox
84
- Returns all web pages containing an email address affiliated with diontraining.com
85
- tracert
86
- Nikto
87
- Web application vulnerability scan
88
- Business continuity disaster recovery planning
89
- An SQL injection could occur because input validation is not being used on the id parameter
90
- Authentication Tokens
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- Use a packet sniffer to monitor network traffic for signs of exploitation. | + |, - Use a network scanner to scan the network for hosts that are running vulnerable software. | + |, - Use a vulnerability scanner to scan the system for known vulnerabilities. | + |
2
- A TCP SYN scan | + |
3
- Automate the tasks using scripting or a SOAR platform. | + |
4
- 172.16.1.3, 192.168.1.12, 445, TCP, ALLOW | + |
5
- Lockheed Martin cyber kill chain | + |
6
- journalctl _UID=1003 | grep sudo
7
- tcpdump
8
- Debugging
9
- Insecure direct object reference
10
- PII of company employees and customers was exfiltrated
11
- OpenIOC
12
- Vulnerability scanning
13
- Patching
14
- SNMP
15
- Dissemination
16
- Forensic analysis
17
- Application blacklist
18
- Command Injection
19
- High
20
- Root cause analysis
21
- Authentication
22
- A malicious inbound TCP packet
23
- WAF
24
- OpenID Connect
25
- Continuous deployment
26
- The application is vulnerable to an XML External Entity attack
27
- Providing a knowledge base of tactics, techniques, and procedures used by attackers
28
- grep -i password logfile.log
29
- Unauthorized privileges are being utilized
30
- EternalBlue
31
- Wiping
32
- XCCDF
33
- Recurrence of the vulnerability
34
- The backup is a differential backup
35
- SCADA
36
- Development of a communication plan
37
- Passive
38
- Require biometric identification for user logins
39
- Human resource system
40
- Reconnaissance
41
- The attacker must have access to the local network that the system is connected to
42
- It provides a quantifiable measure of the vulnerability management program's effectiveness
43
- Transference
44
- Ask a member of law enforcement to meet with your employee
45
- Unauthorized softwar
46
- Degaussing
47
- Ensuring the safety and security of all personnel, - Prevention of an ongoing intrusion or data breach
48
- Change all devices and servers that support it to port 636 since encrypted services run by default on port 636
49
- Exploitation
50
- Management network
51
- Incident response report
52
- Data owner
53
- NAC
54
- Black box
55
- Leading to postponed or overlooked system updates and patches
56
- Alerting the incident response team and working with them to mitigate any potential harm
57
- Installation
58
- Any listed answers may be true
59
- DES
60
- Parameterized queries
61
- User authentication
62
- GLBA
63
- Get leadership concurrence on the scoping document
64
- Ensure that all each individual console has its own unique key for decrypting individual licenses and tracking which console has purchased which game
65
- Self-checking
66
- Your email server is running on a non-standard port
67
- strcpy could allow a buffer overflow to occur; upgrade the operating system to run ASLR to prevent a buffer overflow
68
- Directory traversal
69
- Banner grabbing and comparing response fingerprints
70
- Input validation
71
- Drupal 7.58/8.5.1
72
- Adversary
73
- Scan the network for additional instances of this vulnerability and patch the affected assets
74
- Infrastructure as Code (IaC)
75
- Insider threats
76
- Training
77
- Beaconing
78
- Implement compensating controls
79
- DLP
80
- Adversary
81
- Contact the service desk or incident response team to determine what to do next
82
- The MOU may limit their ability to identify and address vulnerabilities in the shared systems
83
- Jumpbox
84
- Returns all web pages containing an email address affiliated with diontraining.com
85
- tracert
86
- Nikto
87
- Web application vulnerability scan
88
- Business continuity disaster recovery planning
89
- An SQL injection could occur because input validation is not being used on the id parameter
90
- Authentication Tokens