当前位置:网站首页>Penetration test interview collection -- HVV---
Penetration test interview collection -- HVV---
2022-04-23 08:08:00 【Cobalt 60】
1. In a particularly important guarantee period , Through which channels will the intelligence support center Distribute Intelligence Information ?
A、 Enterprise wechat group
B、 mail
C、 official account
D、 WeChat official account
2.Webshell Why can't we detect ?
A、Webshell Is an orphan page , The page cannot be crawled
B、Webshell Itself cannot be accessed directly
C、Webshell The page content does not belong to the hanging horse type
D、 The hanging horse monitoring purchased by customers is a trial service
3. Prepare the correct sequence of operations for the new virtual machine ?
Create a virtual machine 、 Installing the operating system 、 load Vmware Tools、 Install patches
4、 A private network address needs to visit Internet, Which of the following technologies can be used ?
A、OSPF
B、BGP
C、IS-IS
D、NAT
5. Identify the physical layer 、 The network layer 、 System level 、 Vulnerabilities in the application layer , Including vulnerable points caused by improper existing safety control measures , What kind of weakness evaluation method does this action belong to ?
A、 Manage vulnerability assessments
B、 Business vulnerability assessment
C、 Technology vulnerability assessment
D、 Process vulnerability assessment
6. Which of the following describes the wrong ?
A、TCP It is a reliable transmission control protocol for connection
B、UDP Is a connectionless user datagram protocol
C、UDP comparison TCP The advantage of this is that it's fast
D、TCP/IP The protocol itself has security characteristics
7. Security incidents have occurred in the following customers , stay IRS When an event is entered in the system , Event permissions must be set to confidential ?
A、 A private university
B、 A public hospital
C、 A joint-stock pharmaceutical factory
D、 A military industrial unit
8. The following description of the alarm statistics aggregation dimension is wrong
A、 The time distribution can show the time trend of attack
B、 Source IP Show the attack intensity of the event
C、 The alarm type shows the attack method
D、 Source IP The geographical location shows the attack intensity of each region
9. The following is for analysis windows System log tool
A、EventLog ExplorerLog
B、Log view
C、Parse
D、Go Access
10. If the vulnerability cannot be repaired in time , What effective risk avoidance measures can be taken ?
A、 Change the risk port corresponding to the service
B、 Protection through professional safety equipment ( for example WAF、IPS), Update the corresponding protection rules
C、 Restrict access to feature ports
D、 Custom filter rules
11. Which of the following is not an installation openssh Dependent software ?
A、lrz sz
B、zlib
C、libcrypto
D、PAM
12. When configuring intrusion prevention policy , If you need to change the default response action of some rules in the built-in module , You need to use () modular , If you need to be specific to a website URL Access control , You need to use ()
A、 Derived template , Built in templates
B、 User Rule Template , Built in templates
C、 Derived template 、 User Rule Template
D、 Derived template 、 Strategy templates
13. The following are not system vulnerability scanning products
A、RS AS
B、 Sky mirror
C、Nessus
D、Burp Suite
14. During offline configuration verification , If the script fails to run or an error is reported , You can see () File to get detailed operation instructions and precautions
A、 Configure audit automation scripts
B、readme.txt
C、 Generated after run XML file
D、 Target device profile
15. About file upload , Which of the following statements is wrong
A、 The front end strictly verifies the file name suffix , Effective defense against arbitrary file upload
B、 Control the permission of uploading file storage directory
C、 The way to use a whitelist , To allow files with specified suffixes to be uploaded
D、 Update editor components in time , Reduce the occurrence of known editor upload vulnerabilities
notes : The technology contained in this article is only for academic exchange , Any illegal use shall be responsible for itself
版权声明
本文为[Cobalt 60]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204230644281839.html
边栏推荐
- Mobile web (Font Icon, plane conversion, color gradient)
- Anti shake and throttling
- Research on software security based on NLP (2)
- 使用 Ingress 实现金丝雀发布
- Canvas learning Chapter 1
- 云计算技能大赛 -- openstack私有云环境 第二部分
- 攻防世界MISC刷题1-50
- BUUCTF [极客大挑战 2019]EasySQL1
- PHP generates short links: convert numbers to letters and letters to numbers
- MYSQL——第一章节(数据类型2)
猜你喜欢

Sto with billing cross company inventory dump return

数据库之Mysql——概述安装篇

【编程实践/嵌入式比赛】嵌入式比赛学习记录(二):基于TCP的图片流传输

Construction of middleman environment mitmproxy

Essays (updated from time to time)

Internal network security attack and defense: a practical guide to penetration testing (8): Authority maintenance analysis and defense

Canvas learning Chapter 1

如何在SQL Server中导入excel数据,2019版

Analysis of Nacos source code

CTF attack and defense world brush questions 51-
随机推荐
CTF-MISC学习之从开始到放弃
Asynchronous learning
使用 Ingress 实现金丝雀发布
Canvas learning Chapter 1
upload-labs 靶场练习
Ribbon start process
Flutter之Provider共享数据的两种方式
数据库之MySQL——基础篇
Chapter IV intangible assets
在线YAML转XML工具
3C裝配中的機械臂運動規劃
【编程实践/嵌入式比赛】嵌入式比赛学习记录(二):基于TCP的图片流传输
几种智能机器人室内定位方法对比
1216_MISRA_C规范学习笔记_控制流的规则要求
Ignis公链的NFT生态发展:Unicorn.art的捐赠开发之路
Ubuntu安装Mysql并查询平均成绩
Solidity IDE Remix中文版使用手册
数据安全问题已成隐患,看vivo如何让“用户数据”重新披甲
Concours de compétences en informatique en nuage - - première partie de l'environnement cloud privé openstack
BUUCTF [ACTF2020 新生赛]Include1