問題一覧
1
The frequency of occurrence is low, and the expected impact value is high
2
Governance
3
Create → Store → Use → Share → Archive → Destroy
4
Reversible
5
John the Ripper
6
Defense in Depth
7
Wireshark
8
Business Continuity Plan
9
… importance assigned to information by its owner, or the purpose of representing its need for protection
10
IaaS
11
Router
12
Risk transfer
13
Cross-Site Scripting
14
Audit logs
15
BYOD
16
Vulnerability
17
Restore company operation to the last-known reliable operation state
18
Trojans
19
Security Awareness
20
Side Channels
21
DMZ
22
7
23
SaaS
24
Physical Control
25
NAC
26
13.16.123.1
27
Business Impact Analysis
28
Locks
29
Side-channel Attack
30
SIEM
31
Denial of Service
32
Patch the system
33
Confidentiality
34
Backdoors
35
ABAC
36
Confidentiality
37
NIDS
38
IPv6 address
39
A previously unknown system vulnerability
40
Human Resources
41
Test patches before applying them
42
Separation of Duties
43
The Disaster Recovery Plan
44
TCP
45
SNMP
46
Smoke sensors
47
GDPR
48
Simulations
49
Regulation
50
Threat Actor
51
DAC
52
Impact
53
Firewalls
54
Acceptable Use Policies
55
Destroy
56
Security Information and Event Manager
57
Community cloud
58
RBAC
59
MAC
60
Guarantee the safety of people
61
One-Time passwords (OTA)
62
Risk reduction
63
Pre-existing
64
TCP
65
Rollback
66
Guidelines
67
Ransomware
68
Destruction
69
Least Privilege
70
Change Management
71
Whaling
72
Rootkits
73
Confidentiality
74
The identification, evaluation and prioritization of risks
75
Segregation
76
Disabled or isolated into a quarantine area until it can be checked and updated
77
Security control
78
Firewalls
79
Authentication
80
2 – 3
81
Detection and Analysis
82
SYN → SYN/ACK → ACK
83
Provide active and qualified service to principal
84
Hybrid cloud
85
Exhaustion of device resources
86
Procedures
87
Tutorial
88
Phishing
89
Provide diligent and competent service to principals
90
Turnstiles
91
7
92
A symmetric key
93
443
94
External Worker
95
Identifying inefficient performing systems, detecting compromises, and providing a record of how systems are used
96
Avoid apparent or actual conflicts of interest
97
Access control lists
98
Preparation → Detection and Analysis → Containment, Eradication and Recovery → Post-Incident Activity
99
Confidentiality
100
Storage controls
xj9 - 19628 - a
xj9 - 19628 - a
critical flaw · 98問 · 2年前xj9 - 19628 - a
xj9 - 19628 - a
98問 • 2年前xj9 - 19628 - b
xj9 - 19628 - b
critical flaw · 30問 · 2年前xj9 - 19628 - b
xj9 - 19628 - b
30問 • 2年前xj9 - 19628 - c
xj9 - 19628 - c
critical flaw · 99問 · 1年前xj9 - 19628 - c
xj9 - 19628 - c
99問 • 1年前xj9 - 19628 - d1
xj9 - 19628 - d1
critical flaw · 99問 · 1年前xj9 - 19628 - d1
xj9 - 19628 - d1
99問 • 1年前xj9 - 19628 - d2
xj9 - 19628 - d2
critical flaw · 98問 · 1年前xj9 - 19628 - d2
xj9 - 19628 - d2
98問 • 1年前1. Shattershot
1. Shattershot
critical flaw · 50問 · 1年前1. Shattershot
1. Shattershot
50問 • 1年前k3ch - 2910116 - D1 - A
k3ch - 2910116 - D1 - A
critical flaw · 100問 · 1年前k3ch - 2910116 - D1 - A
k3ch - 2910116 - D1 - A
100問 • 1年前k3ch - 2910116 - D1 - B
k3ch - 2910116 - D1 - B
critical flaw · 65問 · 1年前k3ch - 2910116 - D1 - B
k3ch - 2910116 - D1 - B
65問 • 1年前k3ch - 2910116 - D2 - A
k3ch - 2910116 - D2 - A
critical flaw · 100問 · 1年前k3ch - 2910116 - D2 - A
k3ch - 2910116 - D2 - A
100問 • 1年前k3ch - 2910116 - D2 - B
k3ch - 2910116 - D2 - B
critical flaw · 55問 · 1年前k3ch - 2910116 - D2 - B
k3ch - 2910116 - D2 - B
55問 • 1年前k3ch - 2910116 - D3 - A
k3ch - 2910116 - D3 - A
critical flaw · 100問 · 1年前k3ch - 2910116 - D3 - A
k3ch - 2910116 - D3 - A
100問 • 1年前k3ch - 2910116 - D3 - B
k3ch - 2910116 - D3 - B
critical flaw · 63問 · 1年前k3ch - 2910116 - D3 - B
k3ch - 2910116 - D3 - B
63問 • 1年前k3ch - 2910116 - D4 - A
k3ch - 2910116 - D4 - A
critical flaw · 100問 · 1年前k3ch - 2910116 - D4 - A
k3ch - 2910116 - D4 - A
100問 • 1年前1. X-Tinction Agenda
1. X-Tinction Agenda
critical flaw · 100問 · 1年前1. X-Tinction Agenda
1. X-Tinction Agenda
100問 • 1年前2. X-Tinction Agenda
2. X-Tinction Agenda
critical flaw · 100問 · 1年前2. X-Tinction Agenda
2. X-Tinction Agenda
100問 • 1年前3. X-Tinction Agenda
3. X-Tinction Agenda
critical flaw · 100問 · 1年前3. X-Tinction Agenda
3. X-Tinction Agenda
100問 • 1年前4. X-Tinction Agenda
4. X-Tinction Agenda
critical flaw · 90問 · 1年前4. X-Tinction Agenda
4. X-Tinction Agenda
90問 • 1年前Executioner's Song Book 1
Executioner's Song Book 1
critical flaw · 30問 · 1年前Executioner's Song Book 1
Executioner's Song Book 1
30問 • 1年前問題一覧
1
The frequency of occurrence is low, and the expected impact value is high
2
Governance
3
Create → Store → Use → Share → Archive → Destroy
4
Reversible
5
John the Ripper
6
Defense in Depth
7
Wireshark
8
Business Continuity Plan
9
… importance assigned to information by its owner, or the purpose of representing its need for protection
10
IaaS
11
Router
12
Risk transfer
13
Cross-Site Scripting
14
Audit logs
15
BYOD
16
Vulnerability
17
Restore company operation to the last-known reliable operation state
18
Trojans
19
Security Awareness
20
Side Channels
21
DMZ
22
7
23
SaaS
24
Physical Control
25
NAC
26
13.16.123.1
27
Business Impact Analysis
28
Locks
29
Side-channel Attack
30
SIEM
31
Denial of Service
32
Patch the system
33
Confidentiality
34
Backdoors
35
ABAC
36
Confidentiality
37
NIDS
38
IPv6 address
39
A previously unknown system vulnerability
40
Human Resources
41
Test patches before applying them
42
Separation of Duties
43
The Disaster Recovery Plan
44
TCP
45
SNMP
46
Smoke sensors
47
GDPR
48
Simulations
49
Regulation
50
Threat Actor
51
DAC
52
Impact
53
Firewalls
54
Acceptable Use Policies
55
Destroy
56
Security Information and Event Manager
57
Community cloud
58
RBAC
59
MAC
60
Guarantee the safety of people
61
One-Time passwords (OTA)
62
Risk reduction
63
Pre-existing
64
TCP
65
Rollback
66
Guidelines
67
Ransomware
68
Destruction
69
Least Privilege
70
Change Management
71
Whaling
72
Rootkits
73
Confidentiality
74
The identification, evaluation and prioritization of risks
75
Segregation
76
Disabled or isolated into a quarantine area until it can be checked and updated
77
Security control
78
Firewalls
79
Authentication
80
2 – 3
81
Detection and Analysis
82
SYN → SYN/ACK → ACK
83
Provide active and qualified service to principal
84
Hybrid cloud
85
Exhaustion of device resources
86
Procedures
87
Tutorial
88
Phishing
89
Provide diligent and competent service to principals
90
Turnstiles
91
7
92
A symmetric key
93
443
94
External Worker
95
Identifying inefficient performing systems, detecting compromises, and providing a record of how systems are used
96
Avoid apparent or actual conflicts of interest
97
Access control lists
98
Preparation → Detection and Analysis → Containment, Eradication and Recovery → Post-Incident Activity
99
Confidentiality
100
Storage controls