問題一覧
1
- Configure a report that provides the information to automatically send to the director's email at the proper time each month.
2
- System administrator
3
- Deploy the patch in a test environment and then conduct a staged rollout in production.
4
- Obtain permission for the scans.
5
- Schedule the patching to occur during a regular maintenance cycle.
6
- Implement a fix immediately and document the change after the fact.
7
- All of the above.
8
- Initiate a high-priority change through her organization's change management process.
9
- Modify the sensitivity level of the scan.
10
- The system administrator blocked the scanner.
11
- SLAs and MOUs
12
- Total number of vulnerabilities reported
13
- Technical Report
14
- All of the above
15
- SLA
16
- Corporate policy
17
- Pietro should configure the reports to generate automatically and provide immediate, automated notification to administrators of the results.
18
- Unknown Device Report
19
- Escalate the issue to the network administrator's manager.
20
- Contact the vendor to obtain a patch
21
- Schedule an emergency maintenance for an off-peak time later in the day.
22
- Deploy a web application firewall.
23
- Legacy systems
24
- Notification to their acquiring bank
25
- Improper usage
26
- A messaging capability that can function if enterprise authentication is unavailable
27
- Disclosure based on public feedback
28
- Joe should not plan on a timeframe for return
29
- Legal counsel
30
- US-CERT
31
- Developers
32
- Human resources
33
- Regulatory bodies
34
- Change the business requirements to enable the vulnerability to be handled.
35
- The executive summary
36
- Conduct media training.
37
- None of the above
38
- Recommendations
39
- CVSS
40
- A patch has caused the compensating control to fail.
41
- The scope statement
42
- Law enforcement engagement may hinder the organization's ability to respond or operate.
43
- Mean time to detect
44
- Alert volume is not an effective security metric.
45
- The timeline
46
- An SLA
47
- The maturity of the exploit code
48
- Install vendor patches against recommendations.
49
- The evidence section
50
- Implement compensating controls.
51
- Hostname and IP address
52
- Mean time to remediate
53
- Recurrence
54
- Basic
55
- Legal counsel
56
- 9.6
57
- Service level objectives
58
- It may slow down patching.
59
- Incident responders determine if it is a real incident.
60
- Tune alerting thresholds
61
- NIST SP 800-61
62
- Customer and media communications
63
- Invest in an awareness and training campaign.
64
- PCI compliance reporting
65
- Configuration management
66
- The time frame the event or incident occurred
67
- Collecting data about the problem
68
- An incident response KPI
69
- Both positive and negative lessons learned during the process
70
- The executive summary
71
- It helps with prioritization.
72
- It will require Natalie to ensure that the service is not disrupted when new, patched containers are deployed and vulnerable containers are disabled.
73
- Patching
74
- Turning the system off
75
- Management
76
- Regulatory requirements
77
- Changing business requirements
78
- The risk is low and should be patched in the next patch cycle.
79
- Evidence
80
- The environmental metric group
81
- A business process interruption issue
82
- Lessons learned
83
- The mitigations section
84
- A proprietary system
85
- Place a hardware firewall between the system and the network.
86
- Note the compensating control and flag the device for follow-up to see if patches become available.
87
- Holding media practice sessions for incident responders as part of IR exercises
88
- Causal factors
89
- The Basic Metric Group, the Temporal Metric Group, and the Environmental Metric Group
90
- With whom?
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- Configure a report that provides the information to automatically send to the director's email at the proper time each month.
2
- System administrator
3
- Deploy the patch in a test environment and then conduct a staged rollout in production.
4
- Obtain permission for the scans.
5
- Schedule the patching to occur during a regular maintenance cycle.
6
- Implement a fix immediately and document the change after the fact.
7
- All of the above.
8
- Initiate a high-priority change through her organization's change management process.
9
- Modify the sensitivity level of the scan.
10
- The system administrator blocked the scanner.
11
- SLAs and MOUs
12
- Total number of vulnerabilities reported
13
- Technical Report
14
- All of the above
15
- SLA
16
- Corporate policy
17
- Pietro should configure the reports to generate automatically and provide immediate, automated notification to administrators of the results.
18
- Unknown Device Report
19
- Escalate the issue to the network administrator's manager.
20
- Contact the vendor to obtain a patch
21
- Schedule an emergency maintenance for an off-peak time later in the day.
22
- Deploy a web application firewall.
23
- Legacy systems
24
- Notification to their acquiring bank
25
- Improper usage
26
- A messaging capability that can function if enterprise authentication is unavailable
27
- Disclosure based on public feedback
28
- Joe should not plan on a timeframe for return
29
- Legal counsel
30
- US-CERT
31
- Developers
32
- Human resources
33
- Regulatory bodies
34
- Change the business requirements to enable the vulnerability to be handled.
35
- The executive summary
36
- Conduct media training.
37
- None of the above
38
- Recommendations
39
- CVSS
40
- A patch has caused the compensating control to fail.
41
- The scope statement
42
- Law enforcement engagement may hinder the organization's ability to respond or operate.
43
- Mean time to detect
44
- Alert volume is not an effective security metric.
45
- The timeline
46
- An SLA
47
- The maturity of the exploit code
48
- Install vendor patches against recommendations.
49
- The evidence section
50
- Implement compensating controls.
51
- Hostname and IP address
52
- Mean time to remediate
53
- Recurrence
54
- Basic
55
- Legal counsel
56
- 9.6
57
- Service level objectives
58
- It may slow down patching.
59
- Incident responders determine if it is a real incident.
60
- Tune alerting thresholds
61
- NIST SP 800-61
62
- Customer and media communications
63
- Invest in an awareness and training campaign.
64
- PCI compliance reporting
65
- Configuration management
66
- The time frame the event or incident occurred
67
- Collecting data about the problem
68
- An incident response KPI
69
- Both positive and negative lessons learned during the process
70
- The executive summary
71
- It helps with prioritization.
72
- It will require Natalie to ensure that the service is not disrupted when new, patched containers are deployed and vulnerable containers are disabled.
73
- Patching
74
- Turning the system off
75
- Management
76
- Regulatory requirements
77
- Changing business requirements
78
- The risk is low and should be patched in the next patch cycle.
79
- Evidence
80
- The environmental metric group
81
- A business process interruption issue
82
- Lessons learned
83
- The mitigations section
84
- A proprietary system
85
- Place a hardware firewall between the system and the network.
86
- Note the compensating control and flag the device for follow-up to see if patches become available.
87
- Holding media practice sessions for incident responders as part of IR exercises
88
- Causal factors
89
- The Basic Metric Group, the Temporal Metric Group, and the Environmental Metric Group
90
- With whom?