問題一覧
1
- Directory traversal
2
- XML injection
3
- Buffer overflow
4
- SQL injection
5
- Input validation
6
- File system
7
- Stack memory
8
- Data encryption
9
- Infrastructure as Code (IaC)
10
- Infrastructure as a Service (IaaS)
11
- Software Defined Networking (SDN)
12
- Software as a Service (SaaS)
13
- Jumpbox
14
- Bastion hosts
15
- Physical
16
- Airgap
17
- tracert
18
- netstat
19
- nbtstat
20
- ipconfig
21
- Nikto
22
- OpenVAS
23
- Nessus
24
- Qualys
25
- Process Monitor
26
- DiskMon
27
- ProcDump
28
- Autoruns
29
- Root cause analysis
30
- Lessons learned
31
- Forensic analysis
32
- Incident response plan
33
- Operation Aurora
34
- SMBGhost
35
- Krack Attack
36
- Petya
37
- Stuxnet
38
- Meltdown
39
- Heartbleed
40
- BlueKeep
41
- Pacu
42
- Nmap
43
- Nessus
44
- Burp Suite
45
- Virtual desktop infrastructure (VDI)
46
- User and entity behavior analytics (UEBA)
47
- Virtual private cloud (VPC)
48
- virtual private network (VPN)
49
- Regression testing
50
- Penetration testing
51
- Fuzzing
52
- User acceptance testing
53
- getfacl
54
- setfacl
55
- aclman & chbkup
56
- iptables
57
- Policy
58
- Procedure
59
- Guideline
60
- Standard
61
- Technical controls
62
- Physical controls
63
- Compensating controls
64
- Administrative controls
65
- Managed Security Service Provider (MSSP)
66
- IaaS ( Infrastructure as a Service )
67
- SaaS ( Software as a Service )
68
- PaaS ( Platform as a Service )
69
- Root cause analysis
70
- Incident response plan
71
- Forensic analysis
72
- Lessons learned
73
- SQL injection
74
- Command injection
75
- Directory traversal
76
- LDAP injection
77
- net use
78
- net group
79
- net user
80
- net config
81
- Well - Known Ports, - Registered Ports, - Dynamic / Private / Ephemeral Ports
82
0 - 1023
83
1024 - 49151
84
49152 - 65535
85
- OWASP Zed Attack Proxy ( Z.A.P. )
86
- OpenVAS ( Open Vulnerability Assessment Scanner )
87
- Nessus
88
- Qualys
89
- Relying parties (RPs)
90
- Security Assertion Markup Language (SAML)
91
- Single sign-on (SSO)
92
- identity provider (IdP)
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- Directory traversal
2
- XML injection
3
- Buffer overflow
4
- SQL injection
5
- Input validation
6
- File system
7
- Stack memory
8
- Data encryption
9
- Infrastructure as Code (IaC)
10
- Infrastructure as a Service (IaaS)
11
- Software Defined Networking (SDN)
12
- Software as a Service (SaaS)
13
- Jumpbox
14
- Bastion hosts
15
- Physical
16
- Airgap
17
- tracert
18
- netstat
19
- nbtstat
20
- ipconfig
21
- Nikto
22
- OpenVAS
23
- Nessus
24
- Qualys
25
- Process Monitor
26
- DiskMon
27
- ProcDump
28
- Autoruns
29
- Root cause analysis
30
- Lessons learned
31
- Forensic analysis
32
- Incident response plan
33
- Operation Aurora
34
- SMBGhost
35
- Krack Attack
36
- Petya
37
- Stuxnet
38
- Meltdown
39
- Heartbleed
40
- BlueKeep
41
- Pacu
42
- Nmap
43
- Nessus
44
- Burp Suite
45
- Virtual desktop infrastructure (VDI)
46
- User and entity behavior analytics (UEBA)
47
- Virtual private cloud (VPC)
48
- virtual private network (VPN)
49
- Regression testing
50
- Penetration testing
51
- Fuzzing
52
- User acceptance testing
53
- getfacl
54
- setfacl
55
- aclman & chbkup
56
- iptables
57
- Policy
58
- Procedure
59
- Guideline
60
- Standard
61
- Technical controls
62
- Physical controls
63
- Compensating controls
64
- Administrative controls
65
- Managed Security Service Provider (MSSP)
66
- IaaS ( Infrastructure as a Service )
67
- SaaS ( Software as a Service )
68
- PaaS ( Platform as a Service )
69
- Root cause analysis
70
- Incident response plan
71
- Forensic analysis
72
- Lessons learned
73
- SQL injection
74
- Command injection
75
- Directory traversal
76
- LDAP injection
77
- net use
78
- net group
79
- net user
80
- net config
81
- Well - Known Ports, - Registered Ports, - Dynamic / Private / Ephemeral Ports
82
0 - 1023
83
1024 - 49151
84
49152 - 65535
85
- OWASP Zed Attack Proxy ( Z.A.P. )
86
- OpenVAS ( Open Vulnerability Assessment Scanner )
87
- Nessus
88
- Qualys
89
- Relying parties (RPs)
90
- Security Assertion Markup Language (SAML)
91
- Single sign-on (SSO)
92
- identity provider (IdP)