問題一覧
1
- secpol.msc
2
- Brute force
3
- Diamond Model of Intrusion Analysis
4
- Pacu
5
- Guidelines
6
- Spectre Attack
7
- Infrastructure
8
- MS17-010
9
- Port 443
10
- Port 137
11
- Badlock
12
- DROWN
13
- Forensic analysis
14
- 50; 1024, --min-hostgroup/max-hostgroup <size>
15
- 20ms; 2s; 4m; 5h, --scan-delay/--max-scan-delay <time>
16
- nmap 192.168.1.1 -oG -, -oG -
17
- A vulnerability with Base metric values of, , - “Attack Vector: Network, , - Attack Complexity: Low,, - Privileges Required: High,, - User Interaction: None, , - Scope: Unchanged, , - Confidentiality: Low, , - Integrity: Low, , - Availability: None” , - and no specified Temporal or Environmental metrics
18
- Encoded as %5D.
19
- Encoded as %2C.
20
- nmap 192.168.1.1 -sS, -sS
21
- \b172\.16\.1\.(25[0-5]|2[0-4][0-9]|19[2-9])\b
22
- plists
23
- DNS poisoning
24
- Brute force
25
- By making it difficult for the organization to fully comprehend and address system vulnerabilities
26
- Tools
27
- Tabletop exercises
28
- Exploitation
29
- Public relations
30
- journalctl _UID=1003 | grep sudo
31
- Passive
32
- A JSON excerpt that describes an APT using the Structured Threat Information eXpression (STIX) format
33
- 192.186.1.100
34
- L3 cache
35
- Create a daily incremental backup to tape
36
- \b172\.16\.1\.(25[0-5]|2[0-4][0-9]|19[2-9])\b
37
- Disabling unused services, - Segmentation
38
- nmap -sT
39
- Command and Control
40
- Identify any potential risks associated with installing the patch, - Validate the installation of the patch in a staging environment, - Ensure all stakeholders are informed of the planned outage, - Document the change in the change management system
41
- Lessons learned
42
- Notification of external authorities is optional, - Total impact includes a loss of customers, - Organization impact is anticipated
43
- Armored virus
44
- Reduce the sensitivity of scans
45
- Root cause analysis
46
- False positive
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- secpol.msc
2
- Brute force
3
- Diamond Model of Intrusion Analysis
4
- Pacu
5
- Guidelines
6
- Spectre Attack
7
- Infrastructure
8
- MS17-010
9
- Port 443
10
- Port 137
11
- Badlock
12
- DROWN
13
- Forensic analysis
14
- 50; 1024, --min-hostgroup/max-hostgroup <size>
15
- 20ms; 2s; 4m; 5h, --scan-delay/--max-scan-delay <time>
16
- nmap 192.168.1.1 -oG -, -oG -
17
- A vulnerability with Base metric values of, , - “Attack Vector: Network, , - Attack Complexity: Low,, - Privileges Required: High,, - User Interaction: None, , - Scope: Unchanged, , - Confidentiality: Low, , - Integrity: Low, , - Availability: None” , - and no specified Temporal or Environmental metrics
18
- Encoded as %5D.
19
- Encoded as %2C.
20
- nmap 192.168.1.1 -sS, -sS
21
- \b172\.16\.1\.(25[0-5]|2[0-4][0-9]|19[2-9])\b
22
- plists
23
- DNS poisoning
24
- Brute force
25
- By making it difficult for the organization to fully comprehend and address system vulnerabilities
26
- Tools
27
- Tabletop exercises
28
- Exploitation
29
- Public relations
30
- journalctl _UID=1003 | grep sudo
31
- Passive
32
- A JSON excerpt that describes an APT using the Structured Threat Information eXpression (STIX) format
33
- 192.186.1.100
34
- L3 cache
35
- Create a daily incremental backup to tape
36
- \b172\.16\.1\.(25[0-5]|2[0-4][0-9]|19[2-9])\b
37
- Disabling unused services, - Segmentation
38
- nmap -sT
39
- Command and Control
40
- Identify any potential risks associated with installing the patch, - Validate the installation of the patch in a staging environment, - Ensure all stakeholders are informed of the planned outage, - Document the change in the change management system
41
- Lessons learned
42
- Notification of external authorities is optional, - Total impact includes a loss of customers, - Organization impact is anticipated
43
- Armored virus
44
- Reduce the sensitivity of scans
45
- Root cause analysis
46
- False positive