問題一覧
1
- It can indicate the scale of an incident and help assess the performance and capacity of detection systems
2
- Classification of information
3
- Impossible Travel
4
- It facilitates quicker identification of vulnerabilities enabling prompt reporting to the supervisory authority
5
- Mitigation
6
- Port scan targeting 10.10.3.6
7
- A covert internal test
8
- HEAD / HTTP/1.1
9
- Process Monitor
10
- Intellectual property
11
- 111, 734, 747
12
- RDP
13
- Root cause analysis
14
- Zero-day attacks
15
- VPN
16
- By extending the capabilities of existing tools
17
- Operation Aurora
18
- Stuxnet
19
- IdP
20
- id = "1' OR '1'=='1" and certification = "cysa' OR '1'=='1"
21
- Weaponization
22
- nmap
23
- Cyber Kill Chain
24
- Potential deficiency in current security controls
25
- Malicious processes
26
- Utilize secure boot
27
- NIPS
28
- Conduct regular training sessions to teach employees how to recognize and avoid phishing emails
29
- Separation of duties
30
- Filter the scan results to include only those items listed as critical in the asset inventory and remediate those vulnerabilities first
31
- Perform evidence retention in accordance with the timescale defined by the regulatory or legal impact of the incident
32
- Pacu
33
- Denial-of-service attacks
34
- VDI
35
- Segmentation-based containment that deceives the attack into believing their attack was successful
36
- Beaconing
37
- Malware has been installed on her computer and is using the IRC protocol to communicate
38
- It aids in understanding the factors that led to the incident, helping to prevent occurrences in the future
39
- Data exfiltration
40
- Connecting to the host using a null session allows enumeration of the share names on the host
41
- Create a hash digest of the source drive and the image file to ensure they match
42
- Quietly gathers information from compromised systems
43
- Regression testing
44
- Purge, validate, and document the sanitization of the drives
45
- getfacl
46
- VM escape
47
- Implement a VLAN to separate the HVAC control system from the open wireless network
48
- It provides a concise overview of the incident, its impact, and the response actions
49
- It ensures compliance with relevant laws and regulations that mandate reporting of certain types of incidents
50
- The host is using the Windows Task Scheduler at 10:42 to run nc.exe from the temp directory to create a remote connection to 123.12.34.12; you should recommend removing the host from the network
51
- Policy
52
- Technical controls
53
- Prioritization
54
- To help management make effective risk base decisions on system disruptions due to patching
55
- Logic bomb
56
- MSSP
57
- Development of a communication plan
58
- Root cause analysis
59
- 23
60
- Perform a scan from on-site
61
- Incident response communication
62
- The attack widely fragmented the image across the host file system
63
- Low
64
- SQL injection
65
- Blue team
66
- Alert volume
67
- Web application cryptography vulnerability
68
- Context-based authentication
69
- Incident response plan
70
- net use
71
- Public relations
72
- Conduct a brute-force attack against the FileVault 2 encryption
73
- Python
74
- Implementing a standardized set of rules for system settings
75
- Staging
76
- The service is running on a port between 1024 and 49151
77
- ZAP
78
- Utilize a secure recursive DNS resolver to a third-party secure DNS resolver
79
- It identifies strengths and weaknesses in the incident response process
80
- High
81
- RP
82
- Setting the secure attribute on the cookie
83
- Implementing automation for routine tasks
84
- Exact data match
85
- Playbooks
86
- Implement a jumpbox system
87
- Password spraying
88
- Conducting a brute force login attempt of a remote service on 192.168.1.142
89
- Testing
90
- Conduct tokenization of the PHI data before ingesting it into the big data application
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- It can indicate the scale of an incident and help assess the performance and capacity of detection systems
2
- Classification of information
3
- Impossible Travel
4
- It facilitates quicker identification of vulnerabilities enabling prompt reporting to the supervisory authority
5
- Mitigation
6
- Port scan targeting 10.10.3.6
7
- A covert internal test
8
- HEAD / HTTP/1.1
9
- Process Monitor
10
- Intellectual property
11
- 111, 734, 747
12
- RDP
13
- Root cause analysis
14
- Zero-day attacks
15
- VPN
16
- By extending the capabilities of existing tools
17
- Operation Aurora
18
- Stuxnet
19
- IdP
20
- id = "1' OR '1'=='1" and certification = "cysa' OR '1'=='1"
21
- Weaponization
22
- nmap
23
- Cyber Kill Chain
24
- Potential deficiency in current security controls
25
- Malicious processes
26
- Utilize secure boot
27
- NIPS
28
- Conduct regular training sessions to teach employees how to recognize and avoid phishing emails
29
- Separation of duties
30
- Filter the scan results to include only those items listed as critical in the asset inventory and remediate those vulnerabilities first
31
- Perform evidence retention in accordance with the timescale defined by the regulatory or legal impact of the incident
32
- Pacu
33
- Denial-of-service attacks
34
- VDI
35
- Segmentation-based containment that deceives the attack into believing their attack was successful
36
- Beaconing
37
- Malware has been installed on her computer and is using the IRC protocol to communicate
38
- It aids in understanding the factors that led to the incident, helping to prevent occurrences in the future
39
- Data exfiltration
40
- Connecting to the host using a null session allows enumeration of the share names on the host
41
- Create a hash digest of the source drive and the image file to ensure they match
42
- Quietly gathers information from compromised systems
43
- Regression testing
44
- Purge, validate, and document the sanitization of the drives
45
- getfacl
46
- VM escape
47
- Implement a VLAN to separate the HVAC control system from the open wireless network
48
- It provides a concise overview of the incident, its impact, and the response actions
49
- It ensures compliance with relevant laws and regulations that mandate reporting of certain types of incidents
50
- The host is using the Windows Task Scheduler at 10:42 to run nc.exe from the temp directory to create a remote connection to 123.12.34.12; you should recommend removing the host from the network
51
- Policy
52
- Technical controls
53
- Prioritization
54
- To help management make effective risk base decisions on system disruptions due to patching
55
- Logic bomb
56
- MSSP
57
- Development of a communication plan
58
- Root cause analysis
59
- 23
60
- Perform a scan from on-site
61
- Incident response communication
62
- The attack widely fragmented the image across the host file system
63
- Low
64
- SQL injection
65
- Blue team
66
- Alert volume
67
- Web application cryptography vulnerability
68
- Context-based authentication
69
- Incident response plan
70
- net use
71
- Public relations
72
- Conduct a brute-force attack against the FileVault 2 encryption
73
- Python
74
- Implementing a standardized set of rules for system settings
75
- Staging
76
- The service is running on a port between 1024 and 49151
77
- ZAP
78
- Utilize a secure recursive DNS resolver to a third-party secure DNS resolver
79
- It identifies strengths and weaknesses in the incident response process
80
- High
81
- RP
82
- Setting the secure attribute on the cookie
83
- Implementing automation for routine tasks
84
- Exact data match
85
- Playbooks
86
- Implement a jumpbox system
87
- Password spraying
88
- Conducting a brute force login attempt of a remote service on 192.168.1.142
89
- Testing
90
- Conduct tokenization of the PHI data before ingesting it into the big data application