Pass the CREST CREST Practitioner CPTIA Questions and answers with CertsForce

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

Mike is an incident handler for PNP Infosystems Inc. One day, there was a ticket submitted regarding a critical incident and Mike was assigned to handle the incident. During the process of incident handling, at one stage, he performed incident analysis and validation to check whether the incident is a genuine incident or a false positive.

Identify the stage he is currently in.

Options:

A.

Post-incident activities


B.

Incident disclosure


C.

Incident recording and assignment


D.

Incident triage


Expert Solution
Questions # 2:

Sam works as an analyst in an organization named InfoTech Security. He was asked to collect information from various threat intelligence sources. In meeting the deadline, he forgot to verify the threat intelligence sources and used data from an open-source data provider, who offered it at a very low cost. Through it was beneficial at the initial stage but relying on such data providers can produce unreliable data and noise putting the organization network into risk.

What mistake Sam did that led to this situation?

Options:

A.

Sam used unreliable intelligence sources.


B.

Sam used data without context.


C.

Sam did not use the proper standardization formats for representing threat data.


D.

Sam did not use the proper technology to use or consume the information.


Expert Solution
Questions # 3:

Tyrion, a professional hacker, is targeting an organization to steal confidential information. He wants to perform website footprinting to obtain the following information, which is hidden in the web page header.

Connection status and content type

Accept-ranges and last-modified information

X-powered-by information

Web server in use and its version

Which of the following tools should the Tyrion use to view header content?

Options:

A.

Hydra


B.

AutoShun


C.

Vanguard enforcer


D.

Burp suite


Expert Solution
Questions # 4:

Enrage Tech Company hired Enrique, a security analyst, for performing threat intelligence analysis. While performing data collection process, he used a counterintelligence mechanism where a recursive DNS server is employed to perform interserver DNS communication and when a request is generated from any name server to the recursive DNS server, the recursive DNS servers log the responses that are received. Then it replicates the logged data and stores the data in the central database. Using these logs, he analyzed the malicious attempts that took place over DNS infrastructure.

Which of the following cyber counterintelligence (CCI) gathering technique has Enrique used for data collection?

Options:

A.

Data collection through passive DNS monitoring


B.

Data collection through DNS interrogation


C.

Data collection through DNS zone transfer


D.

Data collection through dynamic DNS (DDNS)


Expert Solution
Questions # 5:

Bob, an incident responder at CyberTech Solutions, is investigating a cybercrime attack occurred in the client company. He acquired the evidence data, preserved it, and started

performing analysis on acquired evidentiary data to identify the source of the crime and the culprit behind the incident.

Identify the forensic investigation phase in which Bob is currently in.

Options:

A.

Vulnerability assessment phase


B.

Post-investigation phase


C.

Pre-investigation phase


D.

Investigation phas


Expert Solution
Questions # 6:

Alexis is working as an incident responder in XYZ organization. She was asked to identify and attribute the actors behind an attack that took place recently. In order to do so, she is performing threat attribution that deals with the identification of the specific person, society, or a country sponsoring a well-planned and executed intrusion or attack over its target. Which of the following types of threat attributions Alexis performed?

Options:

A.

Nation-state attribution


B.

Intrusion-set attribution


C.

True attribution


D.

Campaign attributio


Expert Solution
Questions # 7:

Smith employs various malware detection techniques to thoroughly examine the

network and its systems for suspicious and malicious malware files. Among all

techniques, which one involves analyzing the memory dumps or binary codes for the

traces of malware?

Options:

A.

Live system


B.

Dynamic analysis


C.

Intrusion analysis


D.

Static analysis


Expert Solution
Questions # 8:

Which of the following types of digital evidence is temporarily stored in a digital device that requires constant power supply and is deleted if the power supply is interrupted?

Options:

A.

Slack space


B.

Process memory


C.

Event logs


D.

Swap file


Expert Solution
Questions # 9:

In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them?

Options:

A.

Active online attack


B.

Zero-day attack


C.

Distributed network attack


D.

Advanced persistent attack


Expert Solution
Questions # 10:

An XYZ organization hired Mr. Andrews, a threat analyst. In order to identify the threats and mitigate the effect of such threats, Mr. Andrews was asked to perform threat modeling. During the process of threat modeling, he collected important information about the treat actor and characterized the analytic behavior of the adversary that includes technological details, goals, and motives that can be useful in building a strong countermeasure.

What stage of the threat modeling is Mr. Andrews currently in?

Options:

A.

System modeling


B.

Threat determination and identification


C.

Threat profiling and attribution


D.

Threat ranking


Expert Solution
Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions