cysa+3
問題一覧
1
tcpdump -n -r packets.pcap host [IP address]
2
CVSS:3.0/AV:NIAC:UPR:L/UI:N/S:U/C:H/:HIA:H
3
Review the headers from the forwarded email, Examine the SPF, DKIM, and DMARC fields from the original email
4
AV:NWAC:H/PR:H/U:RIS:U/C:H/|:H/A:L - Base Score 6.0
5
Integrate an IT service delivery ticketing system to track remediation and closure
6
Add data enrichment for IPs in the ingestion pipeline
7
Multifactor authentication
8
Deploy a scanner sensor on every segment and perform credentialed scans
9
Watermarking
10
Data masking
11
The message fails a DMARC check
12
Header analysis
13
Allowlisting
14
Quarantine the server.
15
Perform a tabletop drill based on previously identified incident scenarios.
16
Configure the servers to forward logs to a SIEM
17
Mean time to detect
18
Mitigate
19
Search for other mail users who have received the same file
20
Compensating controls
21
Vulnerability B
22
Review the steps that the previous analyst followed.
23
great.skills
24
Increasing training and awareness for all staff
25
Exfiltration
26
Credentialed scan
27
False negative
28
Discovery scan
29
SLA
30
Transfer
31
Establish quarterly SDLC training on the top vulnerabilities for developers
32
Encryption, Access controls
33
The scanner is running in active mode.
34
Implement controls to block execution of untrusted applications
35
Group A
36
MITRE ATTACK
37
Root cause analysis
38
Data exfiltration
39
Redis Server
40
Identify the IP/hostname for the requests and look at the related activity
41
host03
42
An Office document with a malicious macro was opened.
43
Place a legal hold on the employee's mailbox.
44
Passive network foot printing
45
The MTTR decreases by 20%.
46
DNS exfiltration
47
SLA
48
RCE
49
CIS Benchmarks
50
Follow the company's incident response plan.
51
Conduct regular code reviews using OWASP best practices.
52
23, 636
53
Threshold value
54
CASB
security+1
security+1
lopkeda · 100問 · 2年前security+1
security+1
100問 • 2年前security+2
security+2
lopkeda · 100問 · 2年前security+2
security+2
100問 • 2年前security+6
security+6
lopkeda · 100問 · 2年前security+6
security+6
100問 • 2年前security+7
security+7
lopkeda · 100問 · 2年前security+7
security+7
100問 • 2年前security+8
security+8
lopkeda · 100問 · 2年前security+8
security+8
100問 • 2年前security+9
security+9
lopkeda · 100問 · 2年前security+9
security+9
100問 • 2年前security+10
security+10
lopkeda · 100問 · 2年前security+10
security+10
100問 • 2年前security+11
security+11
lopkeda · 100問 · 2年前security+11
security+11
100問 • 2年前security+12
security+12
lopkeda · 64問 · 2年前security+12
security+12
64問 • 2年前cysa+1
cysa+1
lopkeda · 100問 · 2年前cysa+1
cysa+1
100問 • 2年前cysa+2
cysa+2
lopkeda · 100問 · 2年前cysa+2
cysa+2
100問 • 2年前A+1
A+1
lopkeda · 100問 · 1年前A+1
A+1
100問 • 1年前問題一覧
1
tcpdump -n -r packets.pcap host [IP address]
2
CVSS:3.0/AV:NIAC:UPR:L/UI:N/S:U/C:H/:HIA:H
3
Review the headers from the forwarded email, Examine the SPF, DKIM, and DMARC fields from the original email
4
AV:NWAC:H/PR:H/U:RIS:U/C:H/|:H/A:L - Base Score 6.0
5
Integrate an IT service delivery ticketing system to track remediation and closure
6
Add data enrichment for IPs in the ingestion pipeline
7
Multifactor authentication
8
Deploy a scanner sensor on every segment and perform credentialed scans
9
Watermarking
10
Data masking
11
The message fails a DMARC check
12
Header analysis
13
Allowlisting
14
Quarantine the server.
15
Perform a tabletop drill based on previously identified incident scenarios.
16
Configure the servers to forward logs to a SIEM
17
Mean time to detect
18
Mitigate
19
Search for other mail users who have received the same file
20
Compensating controls
21
Vulnerability B
22
Review the steps that the previous analyst followed.
23
great.skills
24
Increasing training and awareness for all staff
25
Exfiltration
26
Credentialed scan
27
False negative
28
Discovery scan
29
SLA
30
Transfer
31
Establish quarterly SDLC training on the top vulnerabilities for developers
32
Encryption, Access controls
33
The scanner is running in active mode.
34
Implement controls to block execution of untrusted applications
35
Group A
36
MITRE ATTACK
37
Root cause analysis
38
Data exfiltration
39
Redis Server
40
Identify the IP/hostname for the requests and look at the related activity
41
host03
42
An Office document with a malicious macro was opened.
43
Place a legal hold on the employee's mailbox.
44
Passive network foot printing
45
The MTTR decreases by 20%.
46
DNS exfiltration
47
SLA
48
RCE
49
CIS Benchmarks
50
Follow the company's incident response plan.
51
Conduct regular code reviews using OWASP best practices.
52
23, 636
53
Threshold value
54
CASB