30 Mayis
問題一覧
1
A. False positive
2
B. Containerization
3
A. Implement a SIEM to correlate logs from multiple sources looking for alterable incidents.
4
A. OWASP
5
A. SSH
6
C. Private key and self-signed certificate
7
B. Port 8080 is a non-standard port and should be blocked.
8
A. Multi Factor authentication
9
A. SOAR
10
A. Air gap
11
A. WAF
12
A. Lessons learned
13
The SMS OTP is more likely to be intercepted and lead to unauthorized disclosure of the code than the TOTP method.
14
B. Lack of vendor support
15
D. Dumpster diving
16
C. Salting
17
B. Implementing mandatory vacations
18
A. Hot site
19
C. Inform the vendor of this discovery in a secure manner and apply appropriate mitigations.
20
C. Supply chain attack
21
B. Integrating each SaaS solution with the identity provider
22
B. Reviewing the domain administrator group, removing all unnecessary administrators, and rotating all passwords
23
A. Playbooks
24
A. DLP
25
A. Secure web gateway
26
A. NIDS
27
B. Whaling
28
B. Deploying an appropriate in-line CASB solution
29
B. Review security policies.
30
C. Standard naming conventions
31
A. It occurs during litigation and requires retention of both electronic and physical documents.
32
C. Preventing unauthenticated clients access to the server
33
B. Account audits
34
C. Cloud
35
Spear phishing
36
C. Data masking
37
E. Evil twin
38
A. Perform nightly snapshots.
39
D. Pass-the-hash
40
Disable default accounts., C. Remove unnecessary services.
41
A. 802.1X
42
B. A rogue access point is allowing users to bypass controls.
43
A. A successful privilege escalation attack by a local user
44
B. Input sanitization
45
B. Smart card
46
A. Air gap
47
A. Channel overlap
48
D. Directory traversal
49
D. EAP-TLS
50
B. NGFW utilizing application inspection
51
C. Both companies following the same CSF
52
D. Operational
53
D. On-path attack
54
B. Disable unnecessary services.
55
C. Destruction, E. Sanitization
56
B. SAML
57
D. Staging
58
D. HVAC
59
D. Separation of duties
60
C. Identity proofing
61
A. Host-based firewall
62
C. Social engineering
63
A. Remote wipe, G. Containerization
64
D. Detective
65
Perform an offline brute-force attack.
66
A. Full
67
A. hping
68
B. XSS
69
A. Spraying
70
C. Retention policy
71
B. Syslog data
72
A. CASB
73
C. Tabletop exercise
74
C. Unblock the OCSP protocol in the host-based firewall.
75
A. Heat map
76
D. Shadow IT
77
C. Asymmetric encryption
78
A. Lack of security updates
79
C. To reduce the risk that the procedures are performed incorrectly or by an unauthorized user
80
A. APT groups
81
A. Isolate the controller from the rest of the network and constrain connectivity.
82
D. Integrity
83
C. Proprietary
84
Honeypot
85
D. Salting
86
To ensure only authorized users have the ability to obtain direct access to systems or data
87
A. Unidentified removable devices
88
B. AAA
89
B. Firmware
90
C. Decommissioning the system
91
C. False positive
92
D. Mean time to repair
93
D. Segregation of duties
94
B. Risk acceptance
95
D. Data blockers
96
C. Recurring
97
B. Firewall
98
C. A DNS sinkhole can be used to capture traffic to known-malicious domains used by attackers.
99
B. Spraying
100
A. Non-repudiation
CNL_CH_1
CNL_CH_1
Son Cagrı · 3回閲覧 · 185問 · 2年前CNL_CH_1
CNL_CH_1
3回閲覧 • 185問 • 2年前CNL_CH_2
CNL_CH_2
Son Cagrı · 109問 · 2年前CNL_CH_2
CNL_CH_2
109問 • 2年前CNL_CH_3
CNL_CH_3
Son Cagrı · 90問 · 2年前CNL_CH_3
CNL_CH_3
90問 • 2年前CNL_CH_4
CNL_CH_4
Son Cagrı · 48問 · 2年前CNL_CH_4
CNL_CH_4
48問 • 2年前CNL_CH_5
CNL_CH_5
Son Cagrı · 83問 · 2年前CNL_CH_5
CNL_CH_5
83問 • 2年前CNL_CH_6
CNL_CH_6
Son Cagrı · 100問 · 2年前CNL_CH_6
CNL_CH_6
100問 • 2年前CNL_CH_7
CNL_CH_7
Son Cagrı · 43問 · 2年前CNL_CH_7
CNL_CH_7
43問 • 2年前CNL_CH_8
CNL_CH_8
Son Cagrı · 66問 · 2年前CNL_CH_8
CNL_CH_8
66問 • 2年前CNL_CH_9
CNL_CH_9
Son Cagrı · 49問 · 2年前CNL_CH_9
CNL_CH_9
49問 • 2年前CNL_CH_10
CNL_CH_10
Son Cagrı · 75問 · 2年前CNL_CH_10
CNL_CH_10
75問 • 2年前CNL_CH_11
CNL_CH_11
Son Cagrı · 118問 · 2年前CNL_CH_11
CNL_CH_11
118問 • 2年前CNL_CH_12
CNL_CH_12
Son Cagrı · 124問 · 2年前CNL_CH_12
CNL_CH_12
124問 • 2年前CNL_CH_13
CNL_CH_13
Son Cagrı · 95問 · 2年前CNL_CH_13
CNL_CH_13
95問 • 2年前21 Mayis
21 Mayis
Son Cagrı · 69問 · 1年前21 Mayis
21 Mayis
69問 • 1年前20 Mayis -175-
20 Mayis -175-
Son Cagrı · 174問 · 1年前20 Mayis -175-
20 Mayis -175-
174問 • 1年前A-1
A-1
Son Cagrı · 216問 · 1年前A-1
A-1
216問 • 1年前A-2
A-2
Son Cagrı · 184問 · 1年前A-2
A-2
184問 • 1年前A-3
A-3
Son Cagrı · 68問 · 1年前A-3
A-3
68問 • 1年前exam topics
exam topics
Son Cagrı · 306問 · 1年前exam topics
exam topics
306問 • 1年前pass4future
pass4future
Son Cagrı · 330問 · 1年前pass4future
pass4future
330問 • 1年前son 1
son 1
Son Cagrı · 349問 · 1年前son 1
son 1
349問 • 1年前son 2
son 2
Son Cagrı · 113問 · 1年前son 2
son 2
113問 • 1年前son 3
son 3
Son Cagrı · 63問 · 1年前son 3
son 3
63問 • 1年前問題一覧
1
A. False positive
2
B. Containerization
3
A. Implement a SIEM to correlate logs from multiple sources looking for alterable incidents.
4
A. OWASP
5
A. SSH
6
C. Private key and self-signed certificate
7
B. Port 8080 is a non-standard port and should be blocked.
8
A. Multi Factor authentication
9
A. SOAR
10
A. Air gap
11
A. WAF
12
A. Lessons learned
13
The SMS OTP is more likely to be intercepted and lead to unauthorized disclosure of the code than the TOTP method.
14
B. Lack of vendor support
15
D. Dumpster diving
16
C. Salting
17
B. Implementing mandatory vacations
18
A. Hot site
19
C. Inform the vendor of this discovery in a secure manner and apply appropriate mitigations.
20
C. Supply chain attack
21
B. Integrating each SaaS solution with the identity provider
22
B. Reviewing the domain administrator group, removing all unnecessary administrators, and rotating all passwords
23
A. Playbooks
24
A. DLP
25
A. Secure web gateway
26
A. NIDS
27
B. Whaling
28
B. Deploying an appropriate in-line CASB solution
29
B. Review security policies.
30
C. Standard naming conventions
31
A. It occurs during litigation and requires retention of both electronic and physical documents.
32
C. Preventing unauthenticated clients access to the server
33
B. Account audits
34
C. Cloud
35
Spear phishing
36
C. Data masking
37
E. Evil twin
38
A. Perform nightly snapshots.
39
D. Pass-the-hash
40
Disable default accounts., C. Remove unnecessary services.
41
A. 802.1X
42
B. A rogue access point is allowing users to bypass controls.
43
A. A successful privilege escalation attack by a local user
44
B. Input sanitization
45
B. Smart card
46
A. Air gap
47
A. Channel overlap
48
D. Directory traversal
49
D. EAP-TLS
50
B. NGFW utilizing application inspection
51
C. Both companies following the same CSF
52
D. Operational
53
D. On-path attack
54
B. Disable unnecessary services.
55
C. Destruction, E. Sanitization
56
B. SAML
57
D. Staging
58
D. HVAC
59
D. Separation of duties
60
C. Identity proofing
61
A. Host-based firewall
62
C. Social engineering
63
A. Remote wipe, G. Containerization
64
D. Detective
65
Perform an offline brute-force attack.
66
A. Full
67
A. hping
68
B. XSS
69
A. Spraying
70
C. Retention policy
71
B. Syslog data
72
A. CASB
73
C. Tabletop exercise
74
C. Unblock the OCSP protocol in the host-based firewall.
75
A. Heat map
76
D. Shadow IT
77
C. Asymmetric encryption
78
A. Lack of security updates
79
C. To reduce the risk that the procedures are performed incorrectly or by an unauthorized user
80
A. APT groups
81
A. Isolate the controller from the rest of the network and constrain connectivity.
82
D. Integrity
83
C. Proprietary
84
Honeypot
85
D. Salting
86
To ensure only authorized users have the ability to obtain direct access to systems or data
87
A. Unidentified removable devices
88
B. AAA
89
B. Firmware
90
C. Decommissioning the system
91
C. False positive
92
D. Mean time to repair
93
D. Segregation of duties
94
B. Risk acceptance
95
D. Data blockers
96
C. Recurring
97
B. Firewall
98
C. A DNS sinkhole can be used to capture traffic to known-malicious domains used by attackers.
99
B. Spraying
100
A. Non-repudiation