exam topics
問題一覧
1
Organized crime
2
Salting
3
Phishing
4
Access list outbound permit 10.50.10.25/32 0.0.0.0/0 port 53 Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port 53
5
SSO
6
A service desk employee receives an email from the HR director asking for log-in credentials to a cloud administrator account. M
7
Jump server
8
WAF
9
Multifactor authentication
10
Impersonation, Smishing
11
Add a smishing exercise to the annual company training., Issue a general email warning to the company.
12
A thorough analysis of the supply chain
13
Rules of engagement
14
Active
15
DRP
16
Side loading
17
Password spraying
18
Secured zones
19
Jump server
20
http://
21
access-list inbound deny ip source 10.1.4.9/32 destination 0.0.0.0/0
22
Implementing a bastion host
23
Endpoint
24
Threat hunting
25
Transfer
26
Full disk
27
Preventive
28
Least privilege
29
Risk register
30
Change management procedure
31
Bug bounty
32
Nation-state
33
SQL injection
34
Intellectual property
35
If a security incident occurs on the device, the correct employee can be notified., Company data can be accounted for when the employee leaves the organization
36
Modify the content of recurring training.
37
Dashboard
38
A rootkit was deployed.
39
Client
40
SOW
41
Input validation
42
Ease of recovery, Responsiveness
43
Create a change control request
44
To prevent future incidents of the same nature
45
Audit findings
46
Capacity planning
47
Geolocation policy
48
Firmware version
49
Testing the policy in a non-production environment before enabling the policy in the production network
50
Warm
51
Sanitization
52
Sensitive
53
Local data protection regulations M
54
Application allow list
55
Red
56
Performing code signing on company-developed software
57
Honeypot
58
Analysis
59
Rescan the network.
60
Insider threat
61
Non-repudiation
62
Automation
63
DLP
64
Input validation
65
Update the EDR policies to block automatic execution of downloaded programs.
66
Compensating control
67
User provisioning script
68
Detective
69
Serverless framework
70
Tuning
71
An attacker is attempting to brute force jsmith’s account.
72
Geographic dispersion
73
Jailbreaking
74
ARO
75
Reporting phishing attempts or other suspicious activities Most Voted
76
x
77
x
78
Preparation
79
Web-based administration
80
FIM
81
Brute-force attack
82
Key escrow, TPM presence
83
Setting up a VPN and placing the jump server inside the firewall
84
IPS
85
Safety controls should fail open
86
Containers
87
Chain of custody
88
Updating processes for sending wire transfers
89
Orchestration
90
Subject
91
Risk threshold
92
Data is being exfiltrated.
93
Supply chain vendor
94
Zero Trust
95
SQL injection
96
OCSP
97
Firmware
98
CVSS
99
Install endpoint management software on all systems
100
Data in transit
CNL_CH_1
CNL_CH_1
Son Cagrı · 3回閲覧 · 185問 · 2年前CNL_CH_1
CNL_CH_1
3回閲覧 • 185問 • 2年前CNL_CH_2
CNL_CH_2
Son Cagrı · 109問 · 2年前CNL_CH_2
CNL_CH_2
109問 • 2年前CNL_CH_3
CNL_CH_3
Son Cagrı · 90問 · 2年前CNL_CH_3
CNL_CH_3
90問 • 2年前CNL_CH_4
CNL_CH_4
Son Cagrı · 48問 · 2年前CNL_CH_4
CNL_CH_4
48問 • 2年前CNL_CH_5
CNL_CH_5
Son Cagrı · 83問 · 2年前CNL_CH_5
CNL_CH_5
83問 • 2年前CNL_CH_6
CNL_CH_6
Son Cagrı · 100問 · 2年前CNL_CH_6
CNL_CH_6
100問 • 2年前CNL_CH_7
CNL_CH_7
Son Cagrı · 43問 · 2年前CNL_CH_7
CNL_CH_7
43問 • 2年前CNL_CH_8
CNL_CH_8
Son Cagrı · 66問 · 2年前CNL_CH_8
CNL_CH_8
66問 • 2年前CNL_CH_9
CNL_CH_9
Son Cagrı · 49問 · 2年前CNL_CH_9
CNL_CH_9
49問 • 2年前CNL_CH_10
CNL_CH_10
Son Cagrı · 75問 · 2年前CNL_CH_10
CNL_CH_10
75問 • 2年前CNL_CH_11
CNL_CH_11
Son Cagrı · 118問 · 2年前CNL_CH_11
CNL_CH_11
118問 • 2年前CNL_CH_12
CNL_CH_12
Son Cagrı · 124問 · 2年前CNL_CH_12
CNL_CH_12
124問 • 2年前CNL_CH_13
CNL_CH_13
Son Cagrı · 95問 · 2年前CNL_CH_13
CNL_CH_13
95問 • 2年前21 Mayis
21 Mayis
Son Cagrı · 69問 · 1年前21 Mayis
21 Mayis
69問 • 1年前20 Mayis -175-
20 Mayis -175-
Son Cagrı · 174問 · 1年前20 Mayis -175-
20 Mayis -175-
174問 • 1年前30 Mayis
30 Mayis
Son Cagrı · 209問 · 1年前30 Mayis
30 Mayis
209問 • 1年前A-1
A-1
Son Cagrı · 216問 · 1年前A-1
A-1
216問 • 1年前A-2
A-2
Son Cagrı · 184問 · 1年前A-2
A-2
184問 • 1年前A-3
A-3
Son Cagrı · 68問 · 1年前A-3
A-3
68問 • 1年前pass4future
pass4future
Son Cagrı · 330問 · 1年前pass4future
pass4future
330問 • 1年前son 1
son 1
Son Cagrı · 349問 · 1年前son 1
son 1
349問 • 1年前son 2
son 2
Son Cagrı · 113問 · 1年前son 2
son 2
113問 • 1年前son 3
son 3
Son Cagrı · 63問 · 1年前son 3
son 3
63問 • 1年前問題一覧
1
Organized crime
2
Salting
3
Phishing
4
Access list outbound permit 10.50.10.25/32 0.0.0.0/0 port 53 Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port 53
5
SSO
6
A service desk employee receives an email from the HR director asking for log-in credentials to a cloud administrator account. M
7
Jump server
8
WAF
9
Multifactor authentication
10
Impersonation, Smishing
11
Add a smishing exercise to the annual company training., Issue a general email warning to the company.
12
A thorough analysis of the supply chain
13
Rules of engagement
14
Active
15
DRP
16
Side loading
17
Password spraying
18
Secured zones
19
Jump server
20
http://
21
access-list inbound deny ip source 10.1.4.9/32 destination 0.0.0.0/0
22
Implementing a bastion host
23
Endpoint
24
Threat hunting
25
Transfer
26
Full disk
27
Preventive
28
Least privilege
29
Risk register
30
Change management procedure
31
Bug bounty
32
Nation-state
33
SQL injection
34
Intellectual property
35
If a security incident occurs on the device, the correct employee can be notified., Company data can be accounted for when the employee leaves the organization
36
Modify the content of recurring training.
37
Dashboard
38
A rootkit was deployed.
39
Client
40
SOW
41
Input validation
42
Ease of recovery, Responsiveness
43
Create a change control request
44
To prevent future incidents of the same nature
45
Audit findings
46
Capacity planning
47
Geolocation policy
48
Firmware version
49
Testing the policy in a non-production environment before enabling the policy in the production network
50
Warm
51
Sanitization
52
Sensitive
53
Local data protection regulations M
54
Application allow list
55
Red
56
Performing code signing on company-developed software
57
Honeypot
58
Analysis
59
Rescan the network.
60
Insider threat
61
Non-repudiation
62
Automation
63
DLP
64
Input validation
65
Update the EDR policies to block automatic execution of downloaded programs.
66
Compensating control
67
User provisioning script
68
Detective
69
Serverless framework
70
Tuning
71
An attacker is attempting to brute force jsmith’s account.
72
Geographic dispersion
73
Jailbreaking
74
ARO
75
Reporting phishing attempts or other suspicious activities Most Voted
76
x
77
x
78
Preparation
79
Web-based administration
80
FIM
81
Brute-force attack
82
Key escrow, TPM presence
83
Setting up a VPN and placing the jump server inside the firewall
84
IPS
85
Safety controls should fail open
86
Containers
87
Chain of custody
88
Updating processes for sending wire transfers
89
Orchestration
90
Subject
91
Risk threshold
92
Data is being exfiltrated.
93
Supply chain vendor
94
Zero Trust
95
SQL injection
96
OCSP
97
Firmware
98
CVSS
99
Install endpoint management software on all systems
100
Data in transit