問題一覧
1
- Customer communication
2
- DLP
3
- Inform management of the issue being experienced
4
- \b172\.16\.1\.(25[0-5]|2[0-4][0-9]|19[2-9])\b
5
- SSH
6
- This critical patch did not remediate the vulnerability, - The vulnerability assessment scan is returning a false positive
7
- FERPA
8
- The function is using hard-coded credentials to verify the password entered by the user
9
- Proper Scheduling of Patching and Vulnerability Mitigation
10
- OpenSSL 1.0.1g
11
- TLS
12
- Insider threat
13
- VLAN
14
- Create a script to automatically update the signatures every 24 hours
15
- Affected Hosts
16
- Physical accessibility, - Encryption
17
- Standardize processes and automate tasks
18
- SQL injection
19
- Wait for a malicious email attachment to be opened, - Take advantage of a software, hardware, or human vulnerability, - Wait for a user to click on a malicious link
20
- Schedule an emergency maintenance for an off-peak time later in the day to remediate the vulnerability
21
- Cognitive password attack
22
- Disabling unused services, - Segmentation
23
- Faulty input validation
24
- Suspend the machine and copy the contents of the directory it resides in
25
- Identify, implement, and document compensating controls
26
- Technical architecture
27
- Insecure direct object reference
28
- Router and switch-based MAC address reporting
29
- TCP ACK
30
- Agent-based scanning
31
- Any individual who worked with evidence during the investigation
32
- Weaponization
33
- Exploitation
34
- Mean time to detect (MTTD), mean time to respond (MTTR), and mean time to remediate (MTTR)
35
- Hacktivist
36
- Lessons learned
37
- Victim
38
- There are bad sectors on the destination drive
39
- Rules of engagement
40
- Counterfeiting
41
- Recurrence
42
- SNMP
43
- Improper input validation
44
- Fuzzing
45
- Golden ticket
46
- Implementing compensating controls
47
- TACACS+
48
- Data enrichment
49
- Containerization
50
- The host might use as a staging area for data exfiltration -- you should conduct volume-based trend analysis on the host's storage device
51
- Software development lifecycle model
52
- Bollards
53
- It provides a record of the incident, aids in decision-making, and supports regulatory compliance
54
- IPSec
55
- nmap -sT
56
- The /etc/passwd file was downloaded using a directory traversal attack if input validation of the URL was not conducted
57
- Transparency gap hampers addressing system vulnerabilities
58
- Utilize a secure recursive DNS resolver to a third-party secure DNS resolver
59
- Command and Control
60
- It helps in understanding the fundamental reasons leading to the incident, enabling better prevention strategies for the future
61
- Infrastructure
62
- Account credentials
63
- False positive
64
- ASLR
65
- The structure and content of your web directories
66
- The structure and content of your web directories
67
- It could indicate a need for improved security measures or updated software-
68
- Inadvertent release of information
69
- Utilize vendor testing and audits
70
- tcpdump -i eth0 host 10.10.1.1
71
- NAC, - GPS location
72
- Dependency on the cloud service provider, - Protection of endpoint security, - Limited disaster recovery options
73
- TCP 0.0.0.0:53 0.0.0.0:0 LISTENING, - TCP 192.168.1.4:53 208.71.44.30:80 ESTABLISHED, - TCP 192.168.1.4:53 91.198.117.247:443 CLOSE_WAIT
74
- Identify any potential risks associated with installing the patch, - Validate the installation of the patch in a staging environment, - Ensure all stakeholders are informed of the planned outage, - Document the change in the change management system
75
- Use a web application firewall (WAF) to block malicious traffic, - Use a firewall to restrict access to the affected systems
76
- Command and Control
77
- Memdump
78
- dion, - DION, - DIOn, - Dion
79
- Mandatory vacations
80
- By lacking available security patches and updates to address known vulnerabilities
81
- Install a mantrap at the entrance
82
- OWASP Testing Guide
83
- FISMA
84
- Search the registry for a complete list
85
- White team
86
- Ransomware
87
- It measures the efficiency of the incident response process and aids in improving response capabilities
88
- Burp Suite
89
- Diamond Model of Intrusion Analysis
90
- dd
(Finals) Professional issues in Information Technology Mocktest BSIT 505
(Finals) Professional issues in Information Technology Mocktest BSIT 505
Xai Alexandrei Delos Reyes · 27問 · 1ヶ月前(Finals) Professional issues in Information Technology Mocktest BSIT 505
(Finals) Professional issues in Information Technology Mocktest BSIT 505
27問 • 1ヶ月前Competence 9
Competence 9
Emm · 116問 · 2ヶ月前Competence 9
Competence 9
116問 • 2ヶ月前competence 7
competence 7
Emm · 20問 · 2ヶ月前competence 7
competence 7
20問 • 2ヶ月前Competence 6
Competence 6
Emm · 146問 · 2ヶ月前Competence 6
Competence 6
146問 • 2ヶ月前COMPETENCE 5
COMPETENCE 5
Emm · 153問 · 2ヶ月前COMPETENCE 5
COMPETENCE 5
153問 • 2ヶ月前Competence 3
Competence 3
Emm · 100問 · 2ヶ月前Competence 3
Competence 3
100問 • 2ヶ月前Competence 3
Competence 3
Emm · 60問 · 2ヶ月前Competence 3
Competence 3
60問 • 2ヶ月前M11c19⚡️
M11c19⚡️
مقطع من الاغاني عراقيه قصيره · 20問 · 2ヶ月前M11c19⚡️
M11c19⚡️
20問 • 2ヶ月前cyber crime ict
cyber crime ict
Desa Mae Santiago · 12問 · 3ヶ月前cyber crime ict
cyber crime ict
12問 • 3ヶ月前COMPUTER 2ND QUARTER
COMPUTER 2ND QUARTER
Karla Marie Ybañez · 38問 · 4ヶ月前COMPUTER 2ND QUARTER
COMPUTER 2ND QUARTER
38問 • 4ヶ月前セキュリティ
セキュリティ
akari · 100問 · 4ヶ月前セキュリティ
セキュリティ
100問 • 4ヶ月前セキュリティ
セキュリティ
akari · 64問 · 4ヶ月前セキュリティ
セキュリティ
64問 • 4ヶ月前L.O. | The Threat Intelligence Cycle
L.O. | The Threat Intelligence Cycle
The R.S.S.H Delivery Company · 40問 · 4ヶ月前L.O. | The Threat Intelligence Cycle
L.O. | The Threat Intelligence Cycle
40問 • 4ヶ月前Introduction to Computing
Introduction to Computing
ユーザ名非公開 · 19問 · 4ヶ月前Introduction to Computing
Introduction to Computing
19問 • 4ヶ月前Data and Digital Communication Mocktest (Prelim) BSIT 505
Data and Digital Communication Mocktest (Prelim) BSIT 505
Xai Alexandrei Delos Reyes · 60問 · 4ヶ月前Data and Digital Communication Mocktest (Prelim) BSIT 505
Data and Digital Communication Mocktest (Prelim) BSIT 505
60問 • 4ヶ月前✅ SY EX | 1 MASTER
✅ SY EX | 1 MASTER
The R.S.S.H Delivery Company · 250問 · 5ヶ月前✅ SY EX | 1 MASTER
✅ SY EX | 1 MASTER
250問 • 5ヶ月前css
css
En. km · 33問 · 5ヶ月前css
css
33問 • 5ヶ月前Css 3 quiz
Css 3 quiz
En. km · 36問 · 5ヶ月前Css 3 quiz
Css 3 quiz
36問 • 5ヶ月前25 ) SY EX. 9 | COMPLETE
25 ) SY EX. 9 | COMPLETE
The R.S.S.H Delivery Company · 15問 · 5ヶ月前25 ) SY EX. 9 | COMPLETE
25 ) SY EX. 9 | COMPLETE
15問 • 5ヶ月前21 ) SY EX. 5 | COMPLETE
21 ) SY EX. 5 | COMPLETE
The R.S.S.H Delivery Company · 91問 · 5ヶ月前21 ) SY EX. 5 | COMPLETE
21 ) SY EX. 5 | COMPLETE
91問 • 5ヶ月前問題一覧
1
- Customer communication
2
- DLP
3
- Inform management of the issue being experienced
4
- \b172\.16\.1\.(25[0-5]|2[0-4][0-9]|19[2-9])\b
5
- SSH
6
- This critical patch did not remediate the vulnerability, - The vulnerability assessment scan is returning a false positive
7
- FERPA
8
- The function is using hard-coded credentials to verify the password entered by the user
9
- Proper Scheduling of Patching and Vulnerability Mitigation
10
- OpenSSL 1.0.1g
11
- TLS
12
- Insider threat
13
- VLAN
14
- Create a script to automatically update the signatures every 24 hours
15
- Affected Hosts
16
- Physical accessibility, - Encryption
17
- Standardize processes and automate tasks
18
- SQL injection
19
- Wait for a malicious email attachment to be opened, - Take advantage of a software, hardware, or human vulnerability, - Wait for a user to click on a malicious link
20
- Schedule an emergency maintenance for an off-peak time later in the day to remediate the vulnerability
21
- Cognitive password attack
22
- Disabling unused services, - Segmentation
23
- Faulty input validation
24
- Suspend the machine and copy the contents of the directory it resides in
25
- Identify, implement, and document compensating controls
26
- Technical architecture
27
- Insecure direct object reference
28
- Router and switch-based MAC address reporting
29
- TCP ACK
30
- Agent-based scanning
31
- Any individual who worked with evidence during the investigation
32
- Weaponization
33
- Exploitation
34
- Mean time to detect (MTTD), mean time to respond (MTTR), and mean time to remediate (MTTR)
35
- Hacktivist
36
- Lessons learned
37
- Victim
38
- There are bad sectors on the destination drive
39
- Rules of engagement
40
- Counterfeiting
41
- Recurrence
42
- SNMP
43
- Improper input validation
44
- Fuzzing
45
- Golden ticket
46
- Implementing compensating controls
47
- TACACS+
48
- Data enrichment
49
- Containerization
50
- The host might use as a staging area for data exfiltration -- you should conduct volume-based trend analysis on the host's storage device
51
- Software development lifecycle model
52
- Bollards
53
- It provides a record of the incident, aids in decision-making, and supports regulatory compliance
54
- IPSec
55
- nmap -sT
56
- The /etc/passwd file was downloaded using a directory traversal attack if input validation of the URL was not conducted
57
- Transparency gap hampers addressing system vulnerabilities
58
- Utilize a secure recursive DNS resolver to a third-party secure DNS resolver
59
- Command and Control
60
- It helps in understanding the fundamental reasons leading to the incident, enabling better prevention strategies for the future
61
- Infrastructure
62
- Account credentials
63
- False positive
64
- ASLR
65
- The structure and content of your web directories
66
- The structure and content of your web directories
67
- It could indicate a need for improved security measures or updated software-
68
- Inadvertent release of information
69
- Utilize vendor testing and audits
70
- tcpdump -i eth0 host 10.10.1.1
71
- NAC, - GPS location
72
- Dependency on the cloud service provider, - Protection of endpoint security, - Limited disaster recovery options
73
- TCP 0.0.0.0:53 0.0.0.0:0 LISTENING, - TCP 192.168.1.4:53 208.71.44.30:80 ESTABLISHED, - TCP 192.168.1.4:53 91.198.117.247:443 CLOSE_WAIT
74
- Identify any potential risks associated with installing the patch, - Validate the installation of the patch in a staging environment, - Ensure all stakeholders are informed of the planned outage, - Document the change in the change management system
75
- Use a web application firewall (WAF) to block malicious traffic, - Use a firewall to restrict access to the affected systems
76
- Command and Control
77
- Memdump
78
- dion, - DION, - DIOn, - Dion
79
- Mandatory vacations
80
- By lacking available security patches and updates to address known vulnerabilities
81
- Install a mantrap at the entrance
82
- OWASP Testing Guide
83
- FISMA
84
- Search the registry for a complete list
85
- White team
86
- Ransomware
87
- It measures the efficiency of the incident response process and aids in improving response capabilities
88
- Burp Suite
89
- Diamond Model of Intrusion Analysis
90
- dd