security+11
問題一覧
1
PCIDSS, GDPR
2
Credential stuffing
3
The business continuity plan
4
An atacker used a pass-the-hash attack to gain access.
5
Walk-through
6
Password, authentication token, thumbprint
7
A right-to-audit clause allowing for annual security audits
8
IaaS
9
Acceptable use policy
10
Legal hold
11
Honeypots
12
Tailgating
13
Encrypted VPN traffic will not be inspected when entering or leaving the network.
14
The GPO blocking the flash drives is being bypassed by a malicious flash drive that is attempting to harvest plaintext credentials from memory.
15
Digital certificate
16
Using a scan-patch-scan process
17
Deploying a SASE solution to remote employees
18
Regulatory requirement
19
Detective
20
Create a change control request.
21
Evil twin
22
Corporate PCs have been turned into a botnet.
23
FIM
24
Host-based firewalls
25
A jump server
26
GDPR
27
Configure SNMPV3.
28
Continuous integration
29
A RAT
30
Facial recognition
31
RAID6
32
Encryption
33
Unavailable patch
34
EDR
35
Cross-site scripting
36
SaaS
37
Performing code signing on company-developed software
38
Utilize a SIEM to centralize logs and dashboards.
39
Reflected denial of service
40
Data masking
41
tail -500 /logfiles/messages | grep www.comptia.com
42
Scanning
43
Thin clients
44
A rootkit was deployed.
45
XSS
46
Hacktivists
47
NIST 800-53
48
CASB
49
Migrate to a cloud backup solution
50
A next-generation firewall
51
Geolocation policy
52
Cold site, Cloud backups
53
Password spraying
54
WAF
55
Pass-the-hash
56
A SIEM
57
Implement S/MIME to encrypt the emails at rest.
58
Red
59
Tabletop
60
Error handling
61
Compensating controls
62
VM escape
63
A weekly, full backup with daily incremental backups
64
The GPS location
65
The S/MIME plug-in is not enabled
66
Microservices
67
Application allow list
68
Configure the guest wireless network to be on a separate VLAN from the company's internal wireless network.
69
Utilizing split tunneling so only traffic for corporate resources is encrypted
70
Setting up a VPN and placing the jump server inside the firewall
71
Supply chain
72
VDI
73
Hacktivist
74
Jailbreaking
75
PowerShell
76
It assures customers that the organization meets security standards
77
Directory traversal; implement a WAF
78
HSM
79
Cache memory, temporary filesystems, disk, archival media
80
Organized crime
81
SLA
82
Insider threat detection
83
Ease of recovery, Responsiveness
84
Risk transference
85
Implement input validations
86
FIM
87
Implement network segmentation
88
SLE x ARO
89
Auto-update, Sandboxing
90
SMS
91
Session Initiation Protocol traffic logs
92
Intellectual property
93
Intrusion prevention system
94
Site survey
95
Network segmentation
96
Social engineering
97
Generator
98
Isolation
99
Jailbreaking
100
Bug bounty
security+1
security+1
lopkeda · 100問 · 2年前security+1
security+1
100問 • 2年前security+2
security+2
lopkeda · 100問 · 2年前security+2
security+2
100問 • 2年前security+6
security+6
lopkeda · 100問 · 2年前security+6
security+6
100問 • 2年前security+7
security+7
lopkeda · 100問 · 2年前security+7
security+7
100問 • 2年前security+8
security+8
lopkeda · 100問 · 2年前security+8
security+8
100問 • 2年前security+9
security+9
lopkeda · 100問 · 2年前security+9
security+9
100問 • 2年前security+10
security+10
lopkeda · 100問 · 2年前security+10
security+10
100問 • 2年前security+12
security+12
lopkeda · 64問 · 2年前security+12
security+12
64問 • 2年前cysa+1
cysa+1
lopkeda · 100問 · 2年前cysa+1
cysa+1
100問 • 2年前cysa+2
cysa+2
lopkeda · 100問 · 2年前cysa+2
cysa+2
100問 • 2年前cysa+3
cysa+3
lopkeda · 54問 · 1年前cysa+3
cysa+3
54問 • 1年前A+1
A+1
lopkeda · 100問 · 1年前A+1
A+1
100問 • 1年前問題一覧
1
PCIDSS, GDPR
2
Credential stuffing
3
The business continuity plan
4
An atacker used a pass-the-hash attack to gain access.
5
Walk-through
6
Password, authentication token, thumbprint
7
A right-to-audit clause allowing for annual security audits
8
IaaS
9
Acceptable use policy
10
Legal hold
11
Honeypots
12
Tailgating
13
Encrypted VPN traffic will not be inspected when entering or leaving the network.
14
The GPO blocking the flash drives is being bypassed by a malicious flash drive that is attempting to harvest plaintext credentials from memory.
15
Digital certificate
16
Using a scan-patch-scan process
17
Deploying a SASE solution to remote employees
18
Regulatory requirement
19
Detective
20
Create a change control request.
21
Evil twin
22
Corporate PCs have been turned into a botnet.
23
FIM
24
Host-based firewalls
25
A jump server
26
GDPR
27
Configure SNMPV3.
28
Continuous integration
29
A RAT
30
Facial recognition
31
RAID6
32
Encryption
33
Unavailable patch
34
EDR
35
Cross-site scripting
36
SaaS
37
Performing code signing on company-developed software
38
Utilize a SIEM to centralize logs and dashboards.
39
Reflected denial of service
40
Data masking
41
tail -500 /logfiles/messages | grep www.comptia.com
42
Scanning
43
Thin clients
44
A rootkit was deployed.
45
XSS
46
Hacktivists
47
NIST 800-53
48
CASB
49
Migrate to a cloud backup solution
50
A next-generation firewall
51
Geolocation policy
52
Cold site, Cloud backups
53
Password spraying
54
WAF
55
Pass-the-hash
56
A SIEM
57
Implement S/MIME to encrypt the emails at rest.
58
Red
59
Tabletop
60
Error handling
61
Compensating controls
62
VM escape
63
A weekly, full backup with daily incremental backups
64
The GPS location
65
The S/MIME plug-in is not enabled
66
Microservices
67
Application allow list
68
Configure the guest wireless network to be on a separate VLAN from the company's internal wireless network.
69
Utilizing split tunneling so only traffic for corporate resources is encrypted
70
Setting up a VPN and placing the jump server inside the firewall
71
Supply chain
72
VDI
73
Hacktivist
74
Jailbreaking
75
PowerShell
76
It assures customers that the organization meets security standards
77
Directory traversal; implement a WAF
78
HSM
79
Cache memory, temporary filesystems, disk, archival media
80
Organized crime
81
SLA
82
Insider threat detection
83
Ease of recovery, Responsiveness
84
Risk transference
85
Implement input validations
86
FIM
87
Implement network segmentation
88
SLE x ARO
89
Auto-update, Sandboxing
90
SMS
91
Session Initiation Protocol traffic logs
92
Intellectual property
93
Intrusion prevention system
94
Site survey
95
Network segmentation
96
Social engineering
97
Generator
98
Isolation
99
Jailbreaking
100
Bug bounty