問題一覧
1
- Different antimalware engines call the same malware package by different names.
2
- Authman
3
- Send the logs to a remote server.
4
- Containerization
5
- Increasing the number of systems in a network segment
6
- None of the above
7
- Software-defined networking
8
- If the traffic is unencrypted
9
- SAML
10
- Entitlement management across multiple systems
11
- Both A and B.
12
- All of the above
13
- An IDP
14
- Automated vulnerability scanning
15
- Application, Control, and Infrastructure layers
16
- Creating a shared network
17
- Multifactor authentication
18
- Reduced cost
19
- Processor security extensions
20
- Both the relying party and the identity provider
21
- From a system on the air-gapped network
22
- Physical access m
23
- Use TLS.
24
- TLS
25
- An active defense
26
- Web browsers will report an expired certificate to users.
27
- TLS
28
- CASB
29
- Kerberos
30
- Single sign-on implementations
31
- Multifactor authentication
32
- Privileged accounts
33
- Run a container host for each application group and secure them based on the data they contain.
34
- Virtualization lets you run multiple operating systems on a single physical system, whereas containerization lets you run multiple applications on the same system.
35
- Horizontal scaling
36
- A honeynet
37
- It allows software-defined network controllers to push changes to devices to manage the network.
38
- VoIP hacks and SIM swapping.
39
- Knowledge and possession
40
- Deploy multifactor authentication.
41
- Air gap
42
- Hashing cannot identify unknown malware.
43
- Compromise of the underlying VMware host
44
- Logical segmentation
45
- Host firewall
46
- Use full-disk encryption.
47
- Multifactor authentication
48
- Airgapping
49
- Network segmentation
50
- Submit cmd.exe to VirusTotal.
51
- A dynamic analysis sandbox tool
52
- Static analysis
53
- A jump box
54
- The files do not match.
55
- Sandboxing
56
- An active defense
57
- It provides information about the techniques attackers are using.
58
- Unintentional insider m
59
- It is a Windows system.
60
- A ping sweep
61
- Low.
62
- OSINT searches of support forums and social engineering
63
- A dynamic analysis sandbox
64
- Wireshark
65
- The scan scanned only UDP ports.
66
- Web servers
67
- RDP
68
- Data exfiltration
69
- LDAPS and HTTPS
70
- The red team is violating the rules of engagement.
71
- A vulnerability scan
72
- RIPE
73
- Self-signed certificates will cause warnings or error messages.
74
- Place a network firewall between the devices and the rest of the network.
75
- 714
76
- They are attempting to crack hashed passwords.
77
- Inability to access logs
78
- Password spraying
79
- Use full-disk encryption.
80
- No significant issues were observed.
81
- Community cloud
82
- Legal counsel
83
- 4
84
- Network scans
85
- FaaS
86
- Reputational
87
- ISAC
88
- Nation-state
89
- Accuracy
90
- Open source
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- Different antimalware engines call the same malware package by different names.
2
- Authman
3
- Send the logs to a remote server.
4
- Containerization
5
- Increasing the number of systems in a network segment
6
- None of the above
7
- Software-defined networking
8
- If the traffic is unencrypted
9
- SAML
10
- Entitlement management across multiple systems
11
- Both A and B.
12
- All of the above
13
- An IDP
14
- Automated vulnerability scanning
15
- Application, Control, and Infrastructure layers
16
- Creating a shared network
17
- Multifactor authentication
18
- Reduced cost
19
- Processor security extensions
20
- Both the relying party and the identity provider
21
- From a system on the air-gapped network
22
- Physical access m
23
- Use TLS.
24
- TLS
25
- An active defense
26
- Web browsers will report an expired certificate to users.
27
- TLS
28
- CASB
29
- Kerberos
30
- Single sign-on implementations
31
- Multifactor authentication
32
- Privileged accounts
33
- Run a container host for each application group and secure them based on the data they contain.
34
- Virtualization lets you run multiple operating systems on a single physical system, whereas containerization lets you run multiple applications on the same system.
35
- Horizontal scaling
36
- A honeynet
37
- It allows software-defined network controllers to push changes to devices to manage the network.
38
- VoIP hacks and SIM swapping.
39
- Knowledge and possession
40
- Deploy multifactor authentication.
41
- Air gap
42
- Hashing cannot identify unknown malware.
43
- Compromise of the underlying VMware host
44
- Logical segmentation
45
- Host firewall
46
- Use full-disk encryption.
47
- Multifactor authentication
48
- Airgapping
49
- Network segmentation
50
- Submit cmd.exe to VirusTotal.
51
- A dynamic analysis sandbox tool
52
- Static analysis
53
- A jump box
54
- The files do not match.
55
- Sandboxing
56
- An active defense
57
- It provides information about the techniques attackers are using.
58
- Unintentional insider m
59
- It is a Windows system.
60
- A ping sweep
61
- Low.
62
- OSINT searches of support forums and social engineering
63
- A dynamic analysis sandbox
64
- Wireshark
65
- The scan scanned only UDP ports.
66
- Web servers
67
- RDP
68
- Data exfiltration
69
- LDAPS and HTTPS
70
- The red team is violating the rules of engagement.
71
- A vulnerability scan
72
- RIPE
73
- Self-signed certificates will cause warnings or error messages.
74
- Place a network firewall between the devices and the rest of the network.
75
- 714
76
- They are attempting to crack hashed passwords.
77
- Inability to access logs
78
- Password spraying
79
- Use full-disk encryption.
80
- No significant issues were observed.
81
- Community cloud
82
- Legal counsel
83
- 4
84
- Network scans
85
- FaaS
86
- Reputational
87
- ISAC
88
- Nation-state
89
- Accuracy
90
- Open source