Sec +
問題一覧
1
Retention
2
SOW
3
Organized crime
4
Peer review and approval
5
Application allow list
6
Jailbreaking
7
Badge access, Access control vestibule
8
Segmentation
9
Removable devices
10
Watering-hole
11
Delpoying a SASE solution to remote employees
12
Regulatory requirement
13
Confidentiality
14
The device’s encryption level cannot meet organizational standards, The device is unable to receive authorized updates
15
Recurring
16
Detective
17
Tabletop
18
Off-site replication
19
Segmentation
20
Password spraying
21
Access control lists
22
SLA
23
Certification
24
Geographic dispersion
25
Query the file’s metadata
26
Purple
27
Patch availability
28
A full inventory of all hardware and software
29
Scheduled downtime
30
Encryption
31
End of life
32
Encryption at rest
33
Reflected denial of service
34
RBAC
35
SIEM
36
Password, authentication token, thumbprint
37
Hardening
38
Buffer overflow
39
Retain any communications related to the security breach until further notice
40
Stenanography
41
Smishing
42
Mitigate
43
Physical
44
Changing the default password
45
Access badge
46
Role-based
47
The reporting mechanisms for ethics violations, Retraining requirements for individuals who fail phishing simulations
48
Availability
49
Pushing GPO update
50
ALE
51
Salting
52
Disable unnecessary ports
53
DDoS
54
Organized crime
55
Network, Firewall
56
Physical
57
Symmetric
58
Port security
59
Destruction, Sanitation
60
Backout plan
61
Virtualization
62
Password complexity, Federation
63
An attacker is attempting to brute force jsmith’s account
問題一覧
1
Retention
2
SOW
3
Organized crime
4
Peer review and approval
5
Application allow list
6
Jailbreaking
7
Badge access, Access control vestibule
8
Segmentation
9
Removable devices
10
Watering-hole
11
Delpoying a SASE solution to remote employees
12
Regulatory requirement
13
Confidentiality
14
The device’s encryption level cannot meet organizational standards, The device is unable to receive authorized updates
15
Recurring
16
Detective
17
Tabletop
18
Off-site replication
19
Segmentation
20
Password spraying
21
Access control lists
22
SLA
23
Certification
24
Geographic dispersion
25
Query the file’s metadata
26
Purple
27
Patch availability
28
A full inventory of all hardware and software
29
Scheduled downtime
30
Encryption
31
End of life
32
Encryption at rest
33
Reflected denial of service
34
RBAC
35
SIEM
36
Password, authentication token, thumbprint
37
Hardening
38
Buffer overflow
39
Retain any communications related to the security breach until further notice
40
Stenanography
41
Smishing
42
Mitigate
43
Physical
44
Changing the default password
45
Access badge
46
Role-based
47
The reporting mechanisms for ethics violations, Retraining requirements for individuals who fail phishing simulations
48
Availability
49
Pushing GPO update
50
ALE
51
Salting
52
Disable unnecessary ports
53
DDoS
54
Organized crime
55
Network, Firewall
56
Physical
57
Symmetric
58
Port security
59
Destruction, Sanitation
60
Backout plan
61
Virtualization
62
Password complexity, Federation
63
An attacker is attempting to brute force jsmith’s account