CPTIA 無料問題集「CREST Practitioner Threat Intelligence Analyst」

During the process of threat intelligence analysis, John, a threat analyst, successfully extracted an indication of adversary's information, such as Modus operandi, tools, communication channels, and forensics evasion strategies used by adversaries.
Identify the type of threat intelligence analysis is performed by John.

解説: (JPNTest メンバーにのみ表示されます)
Which of the following best describes an email issued as an attack medium, in which several messages are sent to a mailbox to cause overflow?

解説: (JPNTest メンバーにのみ表示されます)
Which of the following has been used to evade IDS and IPS?

解説: (JPNTest メンバーにのみ表示されます)
Which of the following is an attack that attempts to prevent the use of systems, networks, or applications by the intended users?

解説: (JPNTest メンバーにのみ表示されます)
Robert is an incident handler working for Xsecurity Inc. One day, his organization faced a massive cyberattack and all the websites related to the organization went offline. Robert was on duty during the incident and he was responsible to handle the incident and maintain business continuity. He immediately restored the web application service with the help of the existing backups.
According to the scenario, which of the following stages of incident handling and response (IH&R) process does Robert performed?

解説: (JPNTest メンバーにのみ表示されます)
Sam received an alert through an email monitoring tool indicating that their company was targeted by a phishing attack. After analyzing the incident, Sam identified that most of the targets of the attack are high- profile executives of the company. What type of phishing attack is this?

解説: (JPNTest メンバーにのみ表示されます)
A team of threat intelligence analysts is performing threat analysis on malware, and each of them has come up with their own theory and evidence to support their theory on a given malware.
Now, to identify the most consistent theory out of all the theories, which of the following analytic processes must threat intelligence manager use?

解説: (JPNTest メンバーにのみ表示されます)
Which of the following options describes common characteristics of phishing emails?

解説: (JPNTest メンバーにのみ表示されます)
Alex is an incident handler for Tech-o-Tech Inc. and is tasked to identify any possible insider threats within his organization. Which of the following insider threat detection techniques can be used by Alex to detect insider threats based on the behavior of a suspicious employee, both individually and in a group?

解説: (JPNTest メンバーにのみ表示されます)
Tibson works as an incident responder for MNC based in Singapore. He is investigating a web application security incident recently faced by the company. The attack is performed on a MS SQL Server hosted by the company. In the detection and analysis phase, he used regular expressions to analyze and detect SQL meta-characters that led to SQL injection attack.
Identify the regular expression used by Tibson to detect SQL injection attack on MS SQL Server.

解説: (JPNTest メンバーにのみ表示されます)

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡