security+12
問題一覧
1
Network, Firewall
2
Retention
3
Testing the policy in a non-production environment before enabling the policy in the production network
4
Integrity
5
6
Change management procedure
7
Conduct an awareness campaign on the usage of removable media.
8
CASB
9
Client
10
DLP
11
Encryption at rest
12
Web-based administration
13
Sanitization
14
Impersonating
15
Federation, Password complexity
16
Jump server
17
A DNS sinkhole can be used to capture traffic to known-malicious domains used by attackers.
18
Salting
19
laC
20
EDR
21
Input sanitization
22
Residual risk
23
HSMaaS
24
SaaS
25
NTP
26
Document this is a false positive
27
A CASB
28
OpenlD
29
Implement a CASB solution.
30
EDR
31
UPS
32
Conduct a site survey.
33
ping, traceroute
34
Dynamic code analysis tool
35
EAP-TLS
36
Provide limited networking details in a partially known-environment test to reduce reconnaissance efforts.
37
Directory traversal
38
CRL
39
Enable HIDS on all servers and endpoints.
40
Pass-the-hash
41
Code repositories
42
A cold aisle, A hot aisle
43
The syslog server
44
Benchmarks
45
DNS spoofing
46
Phishing
47
Smart card
48
Deploying a captive portal to capture visitors' MAC addresses and names
49
Shadow IT
50
Contain the impacted hosts.
51
FTP is an insecure protocol and should not be used.
52
Evil twin
53
Block the URL shortener domain in the web proxy.
54
SSO
55
Containers
56
Segmentation
57
Implementing multifactor authentication
58
Privilege escalation
59
hping
60
Skimming
61
job rotation
62
Account audits
63
Continuity of operations plan
64
Risk acceptance
security+1
security+1
lopkeda · 100問 · 2年前security+1
security+1
100問 • 2年前security+2
security+2
lopkeda · 100問 · 2年前security+2
security+2
100問 • 2年前security+6
security+6
lopkeda · 100問 · 2年前security+6
security+6
100問 • 2年前security+7
security+7
lopkeda · 100問 · 2年前security+7
security+7
100問 • 2年前security+8
security+8
lopkeda · 100問 · 2年前security+8
security+8
100問 • 2年前security+9
security+9
lopkeda · 100問 · 2年前security+9
security+9
100問 • 2年前security+10
security+10
lopkeda · 100問 · 2年前security+10
security+10
100問 • 2年前security+11
security+11
lopkeda · 100問 · 2年前security+11
security+11
100問 • 2年前cysa+1
cysa+1
lopkeda · 100問 · 2年前cysa+1
cysa+1
100問 • 2年前cysa+2
cysa+2
lopkeda · 100問 · 2年前cysa+2
cysa+2
100問 • 2年前cysa+3
cysa+3
lopkeda · 54問 · 1年前cysa+3
cysa+3
54問 • 1年前A+1
A+1
lopkeda · 100問 · 1年前A+1
A+1
100問 • 1年前問題一覧
1
Network, Firewall
2
Retention
3
Testing the policy in a non-production environment before enabling the policy in the production network
4
Integrity
5
6
Change management procedure
7
Conduct an awareness campaign on the usage of removable media.
8
CASB
9
Client
10
DLP
11
Encryption at rest
12
Web-based administration
13
Sanitization
14
Impersonating
15
Federation, Password complexity
16
Jump server
17
A DNS sinkhole can be used to capture traffic to known-malicious domains used by attackers.
18
Salting
19
laC
20
EDR
21
Input sanitization
22
Residual risk
23
HSMaaS
24
SaaS
25
NTP
26
Document this is a false positive
27
A CASB
28
OpenlD
29
Implement a CASB solution.
30
EDR
31
UPS
32
Conduct a site survey.
33
ping, traceroute
34
Dynamic code analysis tool
35
EAP-TLS
36
Provide limited networking details in a partially known-environment test to reduce reconnaissance efforts.
37
Directory traversal
38
CRL
39
Enable HIDS on all servers and endpoints.
40
Pass-the-hash
41
Code repositories
42
A cold aisle, A hot aisle
43
The syslog server
44
Benchmarks
45
DNS spoofing
46
Phishing
47
Smart card
48
Deploying a captive portal to capture visitors' MAC addresses and names
49
Shadow IT
50
Contain the impacted hosts.
51
FTP is an insecure protocol and should not be used.
52
Evil twin
53
Block the URL shortener domain in the web proxy.
54
SSO
55
Containers
56
Segmentation
57
Implementing multifactor authentication
58
Privilege escalation
59
hping
60
Skimming
61
job rotation
62
Account audits
63
Continuity of operations plan
64
Risk acceptance