CPTIA 無料問題集「CREST Practitioner Threat Intelligence Analyst」
During the process of threat intelligence analysis, John, a threat analyst, successfully extracted an indication of adversary's information, such as Modus operandi, tools, communication channels, and forensics evasion strategies used by adversaries.
Identify the type of threat intelligence analysis is performed by John.
Identify the type of threat intelligence analysis is performed by John.
正解:B
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
Robert is an incident handler working for Xsecurity Inc. One day, his organization faced a massive cyberattack and all the websites related to the organization went offline. Robert was on duty during the incident and he was responsible to handle the incident and maintain business continuity. He immediately restored the web application service with the help of the existing backups.
According to the scenario, which of the following stages of incident handling and response (IH&R) process does Robert performed?
According to the scenario, which of the following stages of incident handling and response (IH&R) process does Robert performed?
正解:D
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
Sam received an alert through an email monitoring tool indicating that their company was targeted by a phishing attack. After analyzing the incident, Sam identified that most of the targets of the attack are high- profile executives of the company. What type of phishing attack is this?
正解:D
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
A team of threat intelligence analysts is performing threat analysis on malware, and each of them has come up with their own theory and evidence to support their theory on a given malware.
Now, to identify the most consistent theory out of all the theories, which of the following analytic processes must threat intelligence manager use?
Now, to identify the most consistent theory out of all the theories, which of the following analytic processes must threat intelligence manager use?
正解:D
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
Alex is an incident handler for Tech-o-Tech Inc. and is tasked to identify any possible insider threats within his organization. Which of the following insider threat detection techniques can be used by Alex to detect insider threats based on the behavior of a suspicious employee, both individually and in a group?
正解:A
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
Tibson works as an incident responder for MNC based in Singapore. He is investigating a web application security incident recently faced by the company. The attack is performed on a MS SQL Server hosted by the company. In the detection and analysis phase, he used regular expressions to analyze and detect SQL meta-characters that led to SQL injection attack.
Identify the regular expression used by Tibson to detect SQL injection attack on MS SQL Server.
Identify the regular expression used by Tibson to detect SQL injection attack on MS SQL Server.
正解:C
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)