問題一覧
1
- XML injection
2
- Excluded hosts
3
- An incident summary report is designed for a non-technical audience
4
- Enumeration
5
- Single Pane of Glass
6
- HFS+
7
- Banner grabbing
8
- Static code analysis
9
- Tabletop exercise
10
- Zero Trust
11
- Legal and regulatory issues may prevent data migration to the cloud
12
- SQL Injection
13
- Perform a scan for the specific vulnerability on all web servers
14
- Physically destroy the storage devices
15
- A weakness allowing an attacker to overflow an application's buffer, causing it to crash or execute arbitrary code
16
- DMARC and DKIM
17
- \b172\.16\.1\.(25[0-5]|2[0-4][0-9]|19[2-9])\b
18
- Submit a Request for Change using the change management process
19
- URL filter
20
- Lessons learned
21
- In the lessons learned section of the incident response report
22
- An endpoint security failure
23
- The entity that is targeted by the attack
24
- Airgap
25
0
26
- Privilege escalation
27
- They define expectations for incident response times and quality, providing clear targets for the response team
28
- Annually
29
- Exfiltrate data, - Modify data, - Lateral movement through the environment, - Privilege escalation
30
- Zone transfers
31
- /etc/xinetd.conf
32
- These devices should be isolated from the rest of the enterprise network
33
- id = "1' OR '1'=='1" and certification = "cysa' OR '1'=='1"
34
- Protected health information
35
- High
36
- Joe Sandbox
37
- plists
38
- DevSecOps
39
- To ensure compliance with data breach laws
40
- Heartbleed
41
- nmap
42
- SQL injection
43
- Cross-site scripting
44
- SOAR (Security Orchestration, Automation, and Response)
45
- Review the asset inventory and BCP
46
- Removable media
47
- Endpoint forensics
48
- To allow the software developer to spot flaws in their source code
49
- 443
50
- SPI
51
- Fear of functionality degradation may delay or deter patch application
52
- Input validation
53
- This approach only changes the location of the network and not the attack surface of it
54
- Forensic analysis
55
- Space and power savings
56
- Static code analyzer
57
- Data sovereignty
58
- Economic, - Data integrity
59
- It demonstrates due diligence and transparency to regulatory bodies regarding addressed vulnerabilities
60
- To ensure the right people are informed and involved in the response process
61
- Guidance from laws and regulations should be considered when deciding who must be notified to avoid fines and judgments from non-compliance
62
- DNS blackholing
63
- Application whitelisting
64
- Syslog
65
- Alert triaging
66
- Kerberos
67
- Cyber Kill Chain
68
- Potentially lengthy approval processes could delay the implementation of necessary patches
69
- Delivery
70
- Compliance with data breach notification laws
71
- You tell the developer to review their code and implement a bug/code fix
72
- Directory traversal
73
- Incident response plan
74
- Recurrence
75
- Failed deperimeterization management
76
- Trusted Firmware
77
- Shellshock
78
- which bash
79
- This appears to be normal network traffic
80
- OWASP Testing Guide
81
- Select backdoor implant and appropriate command and control infrastructure for operation, - Select a decoy document to present to the victim, - Obtain a weaponizer
82
- Zero-day attack
83
- Impossible Travel
84
- DNS poisoning
85
- Discovering potential threats before they impact your organization
86
- Recommend isolation of the elevator control system from the rest of the production network through the change control process
87
- Train users to not unplug their computers when a suspected incident is occurring
88
- MD5 or SHA1 hash digest of the file
89
- Risk Score
90
- Public relations communication
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- XML injection
2
- Excluded hosts
3
- An incident summary report is designed for a non-technical audience
4
- Enumeration
5
- Single Pane of Glass
6
- HFS+
7
- Banner grabbing
8
- Static code analysis
9
- Tabletop exercise
10
- Zero Trust
11
- Legal and regulatory issues may prevent data migration to the cloud
12
- SQL Injection
13
- Perform a scan for the specific vulnerability on all web servers
14
- Physically destroy the storage devices
15
- A weakness allowing an attacker to overflow an application's buffer, causing it to crash or execute arbitrary code
16
- DMARC and DKIM
17
- \b172\.16\.1\.(25[0-5]|2[0-4][0-9]|19[2-9])\b
18
- Submit a Request for Change using the change management process
19
- URL filter
20
- Lessons learned
21
- In the lessons learned section of the incident response report
22
- An endpoint security failure
23
- The entity that is targeted by the attack
24
- Airgap
25
0
26
- Privilege escalation
27
- They define expectations for incident response times and quality, providing clear targets for the response team
28
- Annually
29
- Exfiltrate data, - Modify data, - Lateral movement through the environment, - Privilege escalation
30
- Zone transfers
31
- /etc/xinetd.conf
32
- These devices should be isolated from the rest of the enterprise network
33
- id = "1' OR '1'=='1" and certification = "cysa' OR '1'=='1"
34
- Protected health information
35
- High
36
- Joe Sandbox
37
- plists
38
- DevSecOps
39
- To ensure compliance with data breach laws
40
- Heartbleed
41
- nmap
42
- SQL injection
43
- Cross-site scripting
44
- SOAR (Security Orchestration, Automation, and Response)
45
- Review the asset inventory and BCP
46
- Removable media
47
- Endpoint forensics
48
- To allow the software developer to spot flaws in their source code
49
- 443
50
- SPI
51
- Fear of functionality degradation may delay or deter patch application
52
- Input validation
53
- This approach only changes the location of the network and not the attack surface of it
54
- Forensic analysis
55
- Space and power savings
56
- Static code analyzer
57
- Data sovereignty
58
- Economic, - Data integrity
59
- It demonstrates due diligence and transparency to regulatory bodies regarding addressed vulnerabilities
60
- To ensure the right people are informed and involved in the response process
61
- Guidance from laws and regulations should be considered when deciding who must be notified to avoid fines and judgments from non-compliance
62
- DNS blackholing
63
- Application whitelisting
64
- Syslog
65
- Alert triaging
66
- Kerberos
67
- Cyber Kill Chain
68
- Potentially lengthy approval processes could delay the implementation of necessary patches
69
- Delivery
70
- Compliance with data breach notification laws
71
- You tell the developer to review their code and implement a bug/code fix
72
- Directory traversal
73
- Incident response plan
74
- Recurrence
75
- Failed deperimeterization management
76
- Trusted Firmware
77
- Shellshock
78
- which bash
79
- This appears to be normal network traffic
80
- OWASP Testing Guide
81
- Select backdoor implant and appropriate command and control infrastructure for operation, - Select a decoy document to present to the victim, - Obtain a weaponizer
82
- Zero-day attack
83
- Impossible Travel
84
- DNS poisoning
85
- Discovering potential threats before they impact your organization
86
- Recommend isolation of the elevator control system from the rest of the production network through the change control process
87
- Train users to not unplug their computers when a suspected incident is occurring
88
- MD5 or SHA1 hash digest of the file
89
- Risk Score
90
- Public relations communication