CNL_CH_12
問題一覧
1
Perform containment on the critical servers and resources
2
Log analysis
3
pivoting
4
False positive
5
Hoaxes
6
Privilege escalation
7
Directory traversal, Privilege escalation
8
Vishing, Credential harvesting
9
Watering hole
10
Configure the web content filter for the web address.
11
Intimidation
12
Reconnaissance
13
A phishing email stating a cash settlement has been awarded but will expire soon
14
DNS
15
Loss of proprietary information
16
Smishing
17
Watering-hole attack
18
Smishing
19
Dark web
20
CVSS
21
Implement a SOAR with customizable playbooks
22
CVSS
23
SIEM
24
Increase in the attack surface
25
SOAR
26
Utilize behavioral analysis to enable the SIEM's learning mode.
27
SNMPv2 SNMPv3, HTTPHTTPS, F. Telnet SSH
28
Create a user account to maintain persistence
29
Update the base container image and redeploy the environment.
30
Unavailable patch
31
Application whitelisting
32
The software was not added to the application whitelist.
33
Zero-day
34
A watering-hole attack
35
Whaling
36
Phishing
37
an influence campaign
38
Zero-day
39
reconnaissance
40
13
41
DNSSEC and DMARC
42
reconnaissance
43
Whaling
44
Whaling
45
Shoulder surfing
46
Vishing
47
Whaling
48
Smishing
49
Social engineering
50
No patches are available for the web browser
51
Test, UAT (User Acceptance testing)
52
Submit the application to QA before releasing it.
53
Apply the patches to systems in a testing environment then to systems in a staging environment, and finally to production systems.
54
Staging
55
Data bias
56
Validation
57
Development - 1
58
Tainted training data
59
Staging
60
Staging
61
Dumpster diving
62
DNS hijacking, Man-in-the-browser
63
Log and alert on unusual scanner account logon times.
64
CVE (Common Vulnerabilities and Exposures)
65
Check the SIEM to review the correlated logs.
66
Credentialed
67
The CIRT
68
A. The unexpected traffic correlated against multiple rules, generating multiple alerts.
69
Threat hunting
70
The scan enumerated software versions of installed programs
71
Log collector
72
The vulnerability scan output
73
Configure the perimeter firewall to deny inbound external connections to SMB ports.
74
An injection attack is being conducted against a user authentication system.
75
Red team
76
Gray-box
77
White-box
78
Dumpster diving
79
prioritize remediation of vulnerabilities based on the possible impact.
80
Tabletop exercise
81
Missing patches for third-party software on Windows workstations and servers
82
Activate runbooks for incident response
83
Verifying that system patching has effectively removed knows vulnerabilities
84
Bug Bounty
85
Run a vulnerability scan.
86
Card skimming
87
EDR
88
Tabletop walk-through
89
Establish persistence for future use.
90
Weak configurations
91
Third-party applications are not being patched.
92
TAXII
93
Improper or weak patch management
94
White team
95
Security patches were uninstalled due to user impact.
96
Non-credentialed
97
Bug bounty
98
Industry information-sharing and collaboration groups
99
TAXII
100
Implement a TAXII server
CNL_CH_1
CNL_CH_1
Son Cagrı · 3回閲覧 · 185問 · 2年前CNL_CH_1
CNL_CH_1
3回閲覧 • 185問 • 2年前CNL_CH_2
CNL_CH_2
Son Cagrı · 109問 · 2年前CNL_CH_2
CNL_CH_2
109問 • 2年前CNL_CH_3
CNL_CH_3
Son Cagrı · 90問 · 2年前CNL_CH_3
CNL_CH_3
90問 • 2年前CNL_CH_4
CNL_CH_4
Son Cagrı · 48問 · 2年前CNL_CH_4
CNL_CH_4
48問 • 2年前CNL_CH_5
CNL_CH_5
Son Cagrı · 83問 · 2年前CNL_CH_5
CNL_CH_5
83問 • 2年前CNL_CH_6
CNL_CH_6
Son Cagrı · 100問 · 2年前CNL_CH_6
CNL_CH_6
100問 • 2年前CNL_CH_7
CNL_CH_7
Son Cagrı · 43問 · 2年前CNL_CH_7
CNL_CH_7
43問 • 2年前CNL_CH_8
CNL_CH_8
Son Cagrı · 66問 · 2年前CNL_CH_8
CNL_CH_8
66問 • 2年前CNL_CH_9
CNL_CH_9
Son Cagrı · 49問 · 2年前CNL_CH_9
CNL_CH_9
49問 • 2年前CNL_CH_10
CNL_CH_10
Son Cagrı · 75問 · 2年前CNL_CH_10
CNL_CH_10
75問 • 2年前CNL_CH_11
CNL_CH_11
Son Cagrı · 118問 · 2年前CNL_CH_11
CNL_CH_11
118問 • 2年前CNL_CH_13
CNL_CH_13
Son Cagrı · 95問 · 2年前CNL_CH_13
CNL_CH_13
95問 • 2年前21 Mayis
21 Mayis
Son Cagrı · 69問 · 1年前21 Mayis
21 Mayis
69問 • 1年前20 Mayis -175-
20 Mayis -175-
Son Cagrı · 174問 · 1年前20 Mayis -175-
20 Mayis -175-
174問 • 1年前30 Mayis
30 Mayis
Son Cagrı · 209問 · 1年前30 Mayis
30 Mayis
209問 • 1年前A-1
A-1
Son Cagrı · 216問 · 1年前A-1
A-1
216問 • 1年前A-2
A-2
Son Cagrı · 184問 · 1年前A-2
A-2
184問 • 1年前A-3
A-3
Son Cagrı · 68問 · 1年前A-3
A-3
68問 • 1年前exam topics
exam topics
Son Cagrı · 306問 · 1年前exam topics
exam topics
306問 • 1年前pass4future
pass4future
Son Cagrı · 330問 · 1年前pass4future
pass4future
330問 • 1年前son 1
son 1
Son Cagrı · 349問 · 1年前son 1
son 1
349問 • 1年前son 2
son 2
Son Cagrı · 113問 · 1年前son 2
son 2
113問 • 1年前son 3
son 3
Son Cagrı · 63問 · 1年前son 3
son 3
63問 • 1年前問題一覧
1
Perform containment on the critical servers and resources
2
Log analysis
3
pivoting
4
False positive
5
Hoaxes
6
Privilege escalation
7
Directory traversal, Privilege escalation
8
Vishing, Credential harvesting
9
Watering hole
10
Configure the web content filter for the web address.
11
Intimidation
12
Reconnaissance
13
A phishing email stating a cash settlement has been awarded but will expire soon
14
DNS
15
Loss of proprietary information
16
Smishing
17
Watering-hole attack
18
Smishing
19
Dark web
20
CVSS
21
Implement a SOAR with customizable playbooks
22
CVSS
23
SIEM
24
Increase in the attack surface
25
SOAR
26
Utilize behavioral analysis to enable the SIEM's learning mode.
27
SNMPv2 SNMPv3, HTTPHTTPS, F. Telnet SSH
28
Create a user account to maintain persistence
29
Update the base container image and redeploy the environment.
30
Unavailable patch
31
Application whitelisting
32
The software was not added to the application whitelist.
33
Zero-day
34
A watering-hole attack
35
Whaling
36
Phishing
37
an influence campaign
38
Zero-day
39
reconnaissance
40
13
41
DNSSEC and DMARC
42
reconnaissance
43
Whaling
44
Whaling
45
Shoulder surfing
46
Vishing
47
Whaling
48
Smishing
49
Social engineering
50
No patches are available for the web browser
51
Test, UAT (User Acceptance testing)
52
Submit the application to QA before releasing it.
53
Apply the patches to systems in a testing environment then to systems in a staging environment, and finally to production systems.
54
Staging
55
Data bias
56
Validation
57
Development - 1
58
Tainted training data
59
Staging
60
Staging
61
Dumpster diving
62
DNS hijacking, Man-in-the-browser
63
Log and alert on unusual scanner account logon times.
64
CVE (Common Vulnerabilities and Exposures)
65
Check the SIEM to review the correlated logs.
66
Credentialed
67
The CIRT
68
A. The unexpected traffic correlated against multiple rules, generating multiple alerts.
69
Threat hunting
70
The scan enumerated software versions of installed programs
71
Log collector
72
The vulnerability scan output
73
Configure the perimeter firewall to deny inbound external connections to SMB ports.
74
An injection attack is being conducted against a user authentication system.
75
Red team
76
Gray-box
77
White-box
78
Dumpster diving
79
prioritize remediation of vulnerabilities based on the possible impact.
80
Tabletop exercise
81
Missing patches for third-party software on Windows workstations and servers
82
Activate runbooks for incident response
83
Verifying that system patching has effectively removed knows vulnerabilities
84
Bug Bounty
85
Run a vulnerability scan.
86
Card skimming
87
EDR
88
Tabletop walk-through
89
Establish persistence for future use.
90
Weak configurations
91
Third-party applications are not being patched.
92
TAXII
93
Improper or weak patch management
94
White team
95
Security patches were uninstalled due to user impact.
96
Non-credentialed
97
Bug bounty
98
Industry information-sharing and collaboration groups
99
TAXII
100
Implement a TAXII server