security+9
問題一覧
1
Compensating
2
TLS
3
Development
4
Legal hold
5
Password history, Geofencing
6
Prevention of information exposure
7
To avoid data leakage
8
The required intermediate certificate is not loaded as part of the certificate chain.
9
Using a SHA 2 signature of a drive image
10
Federation
11
Overwriting
12
APT
13
COPE and VDI
14
Reverse proxy
15
SOAR playbook
16
Set up hashing on the source log file servers that complies with local regulatory requirements,
17
TPM
18
Password spraying
19
Hoaxing
20
Push notifications
21
Shared tenancy
22
DLP
23
Impossible travel time
24
Dictionary
25
ISO 31000
26
Salting
27
DLP
28
Tailgating
29
Personal health information
30
Dynamic code analysis
31
Security patches were uninstalled due to user impact.
32
Chain of custody
33
Hybrid cloud, Fog computing
34
Job rotation policy
35
Integration and auditing
36
WPA2
37
Configure the MDM software to enforce the use of PINS to access the phone.
38
Secure the access point and cabling inside the drop ceiling.
39
HIPS
40
Corrective
41
Preparation
42
Installing a managed PDU
43
Cryptographic downgrade
44
Run a vulnerability scan.
45
TACACS+
46
Card skimming
47
Barricades, Motion sensors
48
DLP
49
DNS spoofing
50
CSRF
51
Directory traversal implement a WAF
52
Smishing
53
Continuous integration
54
The organization is expecting to process credit card information.
55
Auto-update, Secure cookies
56
Spraying
57
Bluesnarfing
58
Enable SNMPV3 With passwords.
59
SMS
60
ldentification
61
Threat feeds
62
Data loss prevention
63
C
64
Phishing campaign
65
.cer
66
Internal
67
RPO
68
TLS inspection
69
Bug bounty
70
S/MIME
71
Access control vestibule
72
The user's IP address is changing between logins, bur the application is not invalidating the token
73
Initiate the organization's incident response plan.
74
The Diamond Model of Intrusion Analysis
75
Account audits
76
Data protection officer
77
Pass the hash
78
DNS poisoning
79
XaaS
80
Logic bomb
81
Code obfuscation
82
Drop
83
AUP
84
Measured boot
85
TPM
86
TACACS+
87
The vulnerability scanner was not properly configured and generated a high number of false positives.
88
Unmodified default settings
89
EAP-FAST
90
NDA
91
A SSL/TLS downgrade
92
Brute-force
93
Supply chain attack
94
Preventive
95
VDI
96
Network DLP solution
97
SSO
98
Geofencing, Password history
99
Typosquatting
100
NAC
security+1
security+1
lopkeda · 100問 · 2年前security+1
security+1
100問 • 2年前security+2
security+2
lopkeda · 100問 · 2年前security+2
security+2
100問 • 2年前security+6
security+6
lopkeda · 100問 · 2年前security+6
security+6
100問 • 2年前security+7
security+7
lopkeda · 100問 · 2年前security+7
security+7
100問 • 2年前security+8
security+8
lopkeda · 100問 · 2年前security+8
security+8
100問 • 2年前security+10
security+10
lopkeda · 100問 · 2年前security+10
security+10
100問 • 2年前security+11
security+11
lopkeda · 100問 · 2年前security+11
security+11
100問 • 2年前security+12
security+12
lopkeda · 64問 · 2年前security+12
security+12
64問 • 2年前cysa+1
cysa+1
lopkeda · 100問 · 2年前cysa+1
cysa+1
100問 • 2年前cysa+2
cysa+2
lopkeda · 100問 · 2年前cysa+2
cysa+2
100問 • 2年前cysa+3
cysa+3
lopkeda · 54問 · 1年前cysa+3
cysa+3
54問 • 1年前A+1
A+1
lopkeda · 100問 · 1年前A+1
A+1
100問 • 1年前問題一覧
1
Compensating
2
TLS
3
Development
4
Legal hold
5
Password history, Geofencing
6
Prevention of information exposure
7
To avoid data leakage
8
The required intermediate certificate is not loaded as part of the certificate chain.
9
Using a SHA 2 signature of a drive image
10
Federation
11
Overwriting
12
APT
13
COPE and VDI
14
Reverse proxy
15
SOAR playbook
16
Set up hashing on the source log file servers that complies with local regulatory requirements,
17
TPM
18
Password spraying
19
Hoaxing
20
Push notifications
21
Shared tenancy
22
DLP
23
Impossible travel time
24
Dictionary
25
ISO 31000
26
Salting
27
DLP
28
Tailgating
29
Personal health information
30
Dynamic code analysis
31
Security patches were uninstalled due to user impact.
32
Chain of custody
33
Hybrid cloud, Fog computing
34
Job rotation policy
35
Integration and auditing
36
WPA2
37
Configure the MDM software to enforce the use of PINS to access the phone.
38
Secure the access point and cabling inside the drop ceiling.
39
HIPS
40
Corrective
41
Preparation
42
Installing a managed PDU
43
Cryptographic downgrade
44
Run a vulnerability scan.
45
TACACS+
46
Card skimming
47
Barricades, Motion sensors
48
DLP
49
DNS spoofing
50
CSRF
51
Directory traversal implement a WAF
52
Smishing
53
Continuous integration
54
The organization is expecting to process credit card information.
55
Auto-update, Secure cookies
56
Spraying
57
Bluesnarfing
58
Enable SNMPV3 With passwords.
59
SMS
60
ldentification
61
Threat feeds
62
Data loss prevention
63
C
64
Phishing campaign
65
.cer
66
Internal
67
RPO
68
TLS inspection
69
Bug bounty
70
S/MIME
71
Access control vestibule
72
The user's IP address is changing between logins, bur the application is not invalidating the token
73
Initiate the organization's incident response plan.
74
The Diamond Model of Intrusion Analysis
75
Account audits
76
Data protection officer
77
Pass the hash
78
DNS poisoning
79
XaaS
80
Logic bomb
81
Code obfuscation
82
Drop
83
AUP
84
Measured boot
85
TPM
86
TACACS+
87
The vulnerability scanner was not properly configured and generated a high number of false positives.
88
Unmodified default settings
89
EAP-FAST
90
NDA
91
A SSL/TLS downgrade
92
Brute-force
93
Supply chain attack
94
Preventive
95
VDI
96
Network DLP solution
97
SSO
98
Geofencing, Password history
99
Typosquatting
100
NAC