ログイン

16 ) EX. 15 | COMPLETE
32問 • 6ヶ月前
  • The R.S.S.H Delivery Company
  • 通報

    問題一覧

  • 1

    Which of the following secure coding best practices ensures special characters like , /, and ‘ are not accepted from the user via a web form?

    - Input validation

  • 2

    This implementation defines the exchange mechanism that will be used between the user and the web application to share and continuously exchange the session I.D.

    - Session management

  • 3

    This involves translating special characters into some different but equivalent form that is no longer dangerous in the target interpreter, for example, translating the < character into the < string when writing to an HTML page.

    - Output encoding

  • 4

    This can introduce various security problems where detailed internal error messages such as stack traces, database dumps, and error codes are displayed to an attacker.

    - Error handling

  • 5

    An organization wants to choose an authentication protocol that can be used over an insecure network without implementing additional encryption services. Which of the following protocols should they choose?

    - Kerberos

  • 6

    This is a networking protocol that provides centralized AAA management for users who connect and use a network service. It operates on a client-server model, where network access servers (NAS), like Wi-Fi access points or VPN concentrators, act as RADIUS clients and forward authentication requests to a central RADIUS server.

    - RADIUS

  • 7

    This is an enhanced and proprietary version of the original TACACS protocol, primarily developed by Cisco. It is a robust network security protocol that provides centralized AAA services for network devices, offering significantly more granular control and enhanced security features.

    - TACACS+

  • 8

    This protocol, developed in 1984, was a network protocol primarily used for communicating with an authentication server, common in older UNIX networks. It also provides centralized AAA services.

    - TACACS

  • 9

    Also known as the Bash bug, is a critical vulnerability that was discovered in 2014. It affected the Bash shell, a widely used command-line interface in Unix-based systems, and allowed attackers to execute arbitrary commands remotely, posing a severe risk to the security and integrity of affected systems.

    - Shell-shock

  • 10

    This was a critical security vulnerability discovered in 2015 that affected the Android operating system. It allowed attackers to exploit vulnerabilities in the multimedia messaging system, enabling remote execution of malicious code through a multimedia message (MMS).

    - Stagefright

  • 11

    This is a security vulnerability that was discovered in 2015, affecting the Diffie-Hellman key exchange protocol used in TLS encryption. It allowed attackers to downgrade encrypted connections to weaker key sizes, making it easier to decrypt and intercept secure communications.

    - Logjam

  • 12

    Drupalgeddon refers to a highly critical vulnerability discovered in the Drupal content management system in 2014. The vulnerability allowed remote code execution, enabling attackers to gain unauthorized access to Drupal-based websites and potentially compromise sensitive data.

    - Drupalgeddon

  • 13

    An analyst suspects that a trojan has victimized a Linux system. Which command should be run to determine where the current bash shell is being executed from on the system?

    - which bash

  • 14

    This command will list the current directory and show any files or folders named bash.

    - ls bash

  • 15

    This command is used to list the contents of a directory, much like ls does.

    - dir bash

  • 16

    This command would print the value of the specified environment variable specified, bash in this example.

    - printenv bash

  • 17

    DeepScan supports data-flow analysis and understands the execution flow of a program. It allows you to see possible security flaws without executing the code. Which of the following types of tools would DeepScan be classified as?

    - Static code analyzer

  • 18

    This is a testing technique that aids in understanding how a system behaves when stressed in unusual ways.

    - Fault injector

  • 19

    This is a computer program that takes an executable file as input and attempts to create a high-level source file that can be recompiled successfully.

    - Decompiler

  • 20

    This is an automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program through a fuzzer.

    - Fuzzer

  • 21

    Commonly used elements: Matches a single instance of a character within the brackets, such as [a-z], [A-Z], [0-9], [azA-Z0-9], [\s] (white space), or [\d] (single digit)

    - [...]

  • 22

    Commonly used elements: Matches one or more occurrences and is called a quantifier, such as \d+ matching one or more digits.

    - +

  • 23

    Commonly used elements: Matches zero or more occurrences, such as \d* matching zero or more digits

    - *

  • 24

    Commonly used elements: Matches one or none times, such as \d? matching zero or one digits

    - ?

  • 25

    Commonly used elements: Matches the number of times within the curly braces, such as \d{3} matching three digits or \d{7-10} matching seven to ten digits

    - {}

  • 26

    Commonly used elements: Defines a matching group with a regex sequence placed within the parentheses, and then each group can subsequently be referred to by \1 for the first group, \2 for the second, and so on

    - (...)

  • 27

    Commonly used elements: The OR logical operator to match conditions as “this or that”

    - |

  • 28

    Commonly used elements: The regex will only match at the start of a line when searching

    - ^

  • 29

    Commonly used elements: The regex will only match at the end of a line when searching

    - $

  • 30

    In regards to H.T.T.P codes, How many classes are these codes grouped into:

    - 5

  • 31

    HT.T.T.P Codes:

    - H.T.T.P Code:, - Code 200:, - Indicates a successful GET or POST request (OK), - Code 201:, - Indicates where a PUT request has succeeded in creating a resource., - Code 3xx:, - Any code in this range indicates that a redirect has occurred by the server., - Code 4xx:, - Any code in this range indicates an error in the client request., - Code 400:, - Indicates that a request could not be parsed by the server., - Code 401:, - Indicates that a request did not supply authentication credentials., - Code 403:, - Indicates that a request did not have sufficient permissions., - Code 404:, - Indicates that a client is requested a non-existent resource., - Code 5xx:, - Any code in this range indicates a server-side issue., - Code 500:, - Indicates a general error on the server-side of the application., - Code 502:, - Indicates a bad gateway has occurred when the server is acting as a proxy., - Code 503:, - Indicates an overloading of the server is causing service unavailability., - Code 504:, - Indicates a gateway timeout means an issue with the upstream server

  • 32

    S.M.T.P. Status Codes to know:

    - Code 220:, - indicates the server is ready., - Code 250:, - indicates the message is accepted., - Code 421:, - indicates the service is not available., - Code 450:, - indicates that the server cannot access the mailbox to deliver a message., - Code 451:, - indicates the local server aborted the action due to a processing error., - Code 452:, - indicates the local server has insufficient storage space available.

  • THE P.T: 1 CHRONICLE: ( ex.9 )

    THE P.T: 1 CHRONICLE: ( ex.9 )

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    THE P.T: 1 CHRONICLE: ( ex.9 )

    THE P.T: 1 CHRONICLE: ( ex.9 )

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T: 2 CHRONICLE: ( ex.10 )

    THE P.T: 2 CHRONICLE: ( ex.10 )

    The R.S.S.H Delivery Company · 88問 · 6ヶ月前

    THE P.T: 2 CHRONICLE: ( ex.10 )

    THE P.T: 2 CHRONICLE: ( ex.10 )

    88問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 3: CHRONICLE: ( ex.12 )

    THE P.T. 3: CHRONICLE: ( ex.12 )

    The R.S.S.H Delivery Company · 89問 · 6ヶ月前

    THE P.T. 3: CHRONICLE: ( ex.12 )

    THE P.T. 3: CHRONICLE: ( ex.12 )

    89問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 4: CHRONICLE: ( ex.11 )

    THE P.T. 4: CHRONICLE: ( ex.11 )

    The R.S.S.H Delivery Company · 52問 · 6ヶ月前

    THE P.T. 4: CHRONICLE: ( ex.11 )

    THE P.T. 4: CHRONICLE: ( ex.11 )

    52問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 5: CHRONICLE: ( ex.13 )

    THE P.T. 5: CHRONICLE: ( ex.13 )

    The R.S.S.H Delivery Company · 92問 · 6ヶ月前

    THE P.T. 5: CHRONICLE: ( ex.13 )

    THE P.T. 5: CHRONICLE: ( ex.13 )

    92問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 6: CHRONICLE: ( ex.14 )

    THE P.T. 6: CHRONICLE: ( ex.14 )

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    THE P.T. 6: CHRONICLE: ( ex.14 )

    THE P.T. 6: CHRONICLE: ( ex.14 )

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 7: ( ex.15 )

    THE P.T. 7: ( ex.15 )

    The R.S.S.H Delivery Company · 48問 · 6ヶ月前

    THE P.T. 7: ( ex.15 )

    THE P.T. 7: ( ex.15 )

    48問 • 6ヶ月前
    The R.S.S.H Delivery Company

    EXAM #1 |

    EXAM #1 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM #1 |

    EXAM #1 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    1 ) Identify Security Control Types

    1 ) Identify Security Control Types

    The R.S.S.H Delivery Company · 5問 · 9ヶ月前

    1 ) Identify Security Control Types

    1 ) Identify Security Control Types

    5問 • 9ヶ月前
    The R.S.S.H Delivery Company

    2 ) Threat Intelligence

    2 ) Threat Intelligence

    The R.S.S.H Delivery Company · 8問 · 9ヶ月前

    2 ) Threat Intelligence

    2 ) Threat Intelligence

    8問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM #2 |

    EXAM #2 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM #2 |

    EXAM #2 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    3 ) Classifying Threats

    3 ) Classifying Threats

    The R.S.S.H Delivery Company · 17問 · 9ヶ月前

    3 ) Classifying Threats

    3 ) Classifying Threats

    17問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 3 |

    EXAM # 3 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 3 |

    EXAM # 3 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    4 ) Threat Hunting

    4 ) Threat Hunting

    The R.S.S.H Delivery Company · 16問 · 9ヶ月前

    4 ) Threat Hunting

    4 ) Threat Hunting

    16問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 4 |

    EXAM # 4 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 4 |

    EXAM # 4 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    5 ) Network Forensics

    5 ) Network Forensics

    The R.S.S.H Delivery Company · 9問 · 9ヶ月前

    5 ) Network Forensics

    5 ) Network Forensics

    9問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 5 |

    EXAM # 5 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 5 |

    EXAM # 5 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    問題一覧

  • 1

    Which of the following secure coding best practices ensures special characters like , /, and ‘ are not accepted from the user via a web form?

    - Input validation

  • 2

    This implementation defines the exchange mechanism that will be used between the user and the web application to share and continuously exchange the session I.D.

    - Session management

  • 3

    This involves translating special characters into some different but equivalent form that is no longer dangerous in the target interpreter, for example, translating the < character into the < string when writing to an HTML page.

    - Output encoding

  • 4

    This can introduce various security problems where detailed internal error messages such as stack traces, database dumps, and error codes are displayed to an attacker.

    - Error handling

  • 5

    An organization wants to choose an authentication protocol that can be used over an insecure network without implementing additional encryption services. Which of the following protocols should they choose?

    - Kerberos

  • 6

    This is a networking protocol that provides centralized AAA management for users who connect and use a network service. It operates on a client-server model, where network access servers (NAS), like Wi-Fi access points or VPN concentrators, act as RADIUS clients and forward authentication requests to a central RADIUS server.

    - RADIUS

  • 7

    This is an enhanced and proprietary version of the original TACACS protocol, primarily developed by Cisco. It is a robust network security protocol that provides centralized AAA services for network devices, offering significantly more granular control and enhanced security features.

    - TACACS+

  • 8

    This protocol, developed in 1984, was a network protocol primarily used for communicating with an authentication server, common in older UNIX networks. It also provides centralized AAA services.

    - TACACS

  • 9

    Also known as the Bash bug, is a critical vulnerability that was discovered in 2014. It affected the Bash shell, a widely used command-line interface in Unix-based systems, and allowed attackers to execute arbitrary commands remotely, posing a severe risk to the security and integrity of affected systems.

    - Shell-shock

  • 10

    This was a critical security vulnerability discovered in 2015 that affected the Android operating system. It allowed attackers to exploit vulnerabilities in the multimedia messaging system, enabling remote execution of malicious code through a multimedia message (MMS).

    - Stagefright

  • 11

    This is a security vulnerability that was discovered in 2015, affecting the Diffie-Hellman key exchange protocol used in TLS encryption. It allowed attackers to downgrade encrypted connections to weaker key sizes, making it easier to decrypt and intercept secure communications.

    - Logjam

  • 12

    Drupalgeddon refers to a highly critical vulnerability discovered in the Drupal content management system in 2014. The vulnerability allowed remote code execution, enabling attackers to gain unauthorized access to Drupal-based websites and potentially compromise sensitive data.

    - Drupalgeddon

  • 13

    An analyst suspects that a trojan has victimized a Linux system. Which command should be run to determine where the current bash shell is being executed from on the system?

    - which bash

  • 14

    This command will list the current directory and show any files or folders named bash.

    - ls bash

  • 15

    This command is used to list the contents of a directory, much like ls does.

    - dir bash

  • 16

    This command would print the value of the specified environment variable specified, bash in this example.

    - printenv bash

  • 17

    DeepScan supports data-flow analysis and understands the execution flow of a program. It allows you to see possible security flaws without executing the code. Which of the following types of tools would DeepScan be classified as?

    - Static code analyzer

  • 18

    This is a testing technique that aids in understanding how a system behaves when stressed in unusual ways.

    - Fault injector

  • 19

    This is a computer program that takes an executable file as input and attempts to create a high-level source file that can be recompiled successfully.

    - Decompiler

  • 20

    This is an automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program through a fuzzer.

    - Fuzzer

  • 21

    Commonly used elements: Matches a single instance of a character within the brackets, such as [a-z], [A-Z], [0-9], [azA-Z0-9], [\s] (white space), or [\d] (single digit)

    - [...]

  • 22

    Commonly used elements: Matches one or more occurrences and is called a quantifier, such as \d+ matching one or more digits.

    - +

  • 23

    Commonly used elements: Matches zero or more occurrences, such as \d* matching zero or more digits

    - *

  • 24

    Commonly used elements: Matches one or none times, such as \d? matching zero or one digits

    - ?

  • 25

    Commonly used elements: Matches the number of times within the curly braces, such as \d{3} matching three digits or \d{7-10} matching seven to ten digits

    - {}

  • 26

    Commonly used elements: Defines a matching group with a regex sequence placed within the parentheses, and then each group can subsequently be referred to by \1 for the first group, \2 for the second, and so on

    - (...)

  • 27

    Commonly used elements: The OR logical operator to match conditions as “this or that”

    - |

  • 28

    Commonly used elements: The regex will only match at the start of a line when searching

    - ^

  • 29

    Commonly used elements: The regex will only match at the end of a line when searching

    - $

  • 30

    In regards to H.T.T.P codes, How many classes are these codes grouped into:

    - 5

  • 31

    HT.T.T.P Codes:

    - H.T.T.P Code:, - Code 200:, - Indicates a successful GET or POST request (OK), - Code 201:, - Indicates where a PUT request has succeeded in creating a resource., - Code 3xx:, - Any code in this range indicates that a redirect has occurred by the server., - Code 4xx:, - Any code in this range indicates an error in the client request., - Code 400:, - Indicates that a request could not be parsed by the server., - Code 401:, - Indicates that a request did not supply authentication credentials., - Code 403:, - Indicates that a request did not have sufficient permissions., - Code 404:, - Indicates that a client is requested a non-existent resource., - Code 5xx:, - Any code in this range indicates a server-side issue., - Code 500:, - Indicates a general error on the server-side of the application., - Code 502:, - Indicates a bad gateway has occurred when the server is acting as a proxy., - Code 503:, - Indicates an overloading of the server is causing service unavailability., - Code 504:, - Indicates a gateway timeout means an issue with the upstream server

  • 32

    S.M.T.P. Status Codes to know:

    - Code 220:, - indicates the server is ready., - Code 250:, - indicates the message is accepted., - Code 421:, - indicates the service is not available., - Code 450:, - indicates that the server cannot access the mailbox to deliver a message., - Code 451:, - indicates the local server aborted the action due to a processing error., - Code 452:, - indicates the local server has insufficient storage space available.