問題一覧
1
- Diamond
2
- Privilege escalation
3
- Delivery
4
- Event Viewer
5
- The attack vector
6
- MITRE ATT&CK
7
- Modify the hosts file.
8
- The service restarted at reboot, so she should add an override file to stop the service from starting.
9
- 10.174.238.88
10
- SSH
11
- PKI
12
- ec2-user
13
- Delete emails with the URL from inbound email.
14
- A DNS sinkhole
15
- No impact to services
16
- Denial of noncritical services
17
- Denial of critical services or loss of contro
18
- Safety systems
19
- The immediate impact on operations so that his team can restore functionality
20
- Number of copies made
21
- Proactive network segmentation
22
- A security incident
23
- Preparation
24
- She can use getfacl.
25
- Option B.
26
- Change the File Vault key using a trusted user account.
27
- A port scan
28
- Cryptographic erase
29
- There is a firewall between the remote network and the server.
30
- Encrypt the RAW file and transfer a hash and key under separate cover.
31
- Use a write blocker.
32
- Chain of custody
33
- Plug the system into an isolated switch and use a span port or tap and Wireshark/tcpdump to capture traffic.
34
- Conduct a lessons learned session.
35
- Copy the virtual disk files and then use a memory capture tool.
36
- To ensure correct reassembly
37
- Review the Apache error log.
38
- Purge, validate, and document.
39
- APFS
40
- Antiforensic activities
41
- Data carving
42
- She should select herself.
43
- No domain, administrator
44
- file
45
- Logical
46
- Chain of custody
47
- Suspend the machine and copy the contents of the directory it resides in.
48
- SQLite
49
- The destination drive is formatted FAT32.
50
- certutil
51
- None of the above
52
- Containment, eradication, and recovery
53
- Supplemented
54
- Drive analysis
55
- Isolation
56
- A precursor
57
- Post-incident recovery
58
- Patching
59
- An adverse event
60
- Microsoft Office document metadata
61
- Create documentation.
62
- Outsource to an incident response provider.
63
- Clear, purge, destroy
64
- Purging.
65
- It provides a block-level snapshot and can be safely deleted.
66
- FAT32
67
- Collect live forensic information, take photos of each system, and power them down.
68
- E-discovery
69
- All individuals who work with evidence in the investigation
70
- An authenticated vulnerability scan from a trusted internal network
71
- Providing authority and resources
72
- Maintain backups of every system and device.
73
- Notification and communication
74
- Shut the system down, remove the drive, and copy it from another system.
75
- The System Reserved and C: partitions
76
- 1 to 2 years
77
- Ability to preserve evidence
78
- RAW
79
- Deleted files
80
- Lessons learned review
81
- CPU cache, network traffic, disk drives, optical media
82
- Containment, eradication, and recovery
83
- All of the above
84
- Identifying attackers is not an important part of the incident response process.
85
- The backup is a differential backup.
86
- A second examiner acting as a witness and countersigning all actions
87
- Isolate the system before restoring from backups.
88
- Slack space
89
- A trusted system binary kit
90
- IP addresses, MAC addresses, hostname
91
- Endpoint forensics
92
- Disconnect the system from the network.
93
- Slack space
94
- Hibernation file analysis
95
- Beaconing
96
- As an integrity loss
97
- Containment, eradication, and recovery
98
- Use the built-in Windows delete command line.
99
- Postmortem forensics
100
- Windows system files
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- Diamond
2
- Privilege escalation
3
- Delivery
4
- Event Viewer
5
- The attack vector
6
- MITRE ATT&CK
7
- Modify the hosts file.
8
- The service restarted at reboot, so she should add an override file to stop the service from starting.
9
- 10.174.238.88
10
- SSH
11
- PKI
12
- ec2-user
13
- Delete emails with the URL from inbound email.
14
- A DNS sinkhole
15
- No impact to services
16
- Denial of noncritical services
17
- Denial of critical services or loss of contro
18
- Safety systems
19
- The immediate impact on operations so that his team can restore functionality
20
- Number of copies made
21
- Proactive network segmentation
22
- A security incident
23
- Preparation
24
- She can use getfacl.
25
- Option B.
26
- Change the File Vault key using a trusted user account.
27
- A port scan
28
- Cryptographic erase
29
- There is a firewall between the remote network and the server.
30
- Encrypt the RAW file and transfer a hash and key under separate cover.
31
- Use a write blocker.
32
- Chain of custody
33
- Plug the system into an isolated switch and use a span port or tap and Wireshark/tcpdump to capture traffic.
34
- Conduct a lessons learned session.
35
- Copy the virtual disk files and then use a memory capture tool.
36
- To ensure correct reassembly
37
- Review the Apache error log.
38
- Purge, validate, and document.
39
- APFS
40
- Antiforensic activities
41
- Data carving
42
- She should select herself.
43
- No domain, administrator
44
- file
45
- Logical
46
- Chain of custody
47
- Suspend the machine and copy the contents of the directory it resides in.
48
- SQLite
49
- The destination drive is formatted FAT32.
50
- certutil
51
- None of the above
52
- Containment, eradication, and recovery
53
- Supplemented
54
- Drive analysis
55
- Isolation
56
- A precursor
57
- Post-incident recovery
58
- Patching
59
- An adverse event
60
- Microsoft Office document metadata
61
- Create documentation.
62
- Outsource to an incident response provider.
63
- Clear, purge, destroy
64
- Purging.
65
- It provides a block-level snapshot and can be safely deleted.
66
- FAT32
67
- Collect live forensic information, take photos of each system, and power them down.
68
- E-discovery
69
- All individuals who work with evidence in the investigation
70
- An authenticated vulnerability scan from a trusted internal network
71
- Providing authority and resources
72
- Maintain backups of every system and device.
73
- Notification and communication
74
- Shut the system down, remove the drive, and copy it from another system.
75
- The System Reserved and C: partitions
76
- 1 to 2 years
77
- Ability to preserve evidence
78
- RAW
79
- Deleted files
80
- Lessons learned review
81
- CPU cache, network traffic, disk drives, optical media
82
- Containment, eradication, and recovery
83
- All of the above
84
- Identifying attackers is not an important part of the incident response process.
85
- The backup is a differential backup.
86
- A second examiner acting as a witness and countersigning all actions
87
- Isolate the system before restoring from backups.
88
- Slack space
89
- A trusted system binary kit
90
- IP addresses, MAC addresses, hostname
91
- Endpoint forensics
92
- Disconnect the system from the network.
93
- Slack space
94
- Hibernation file analysis
95
- Beaconing
96
- As an integrity loss
97
- Containment, eradication, and recovery
98
- Use the built-in Windows delete command line.
99
- Postmortem forensics
100
- Windows system files