Pass the CREST CREST Practitioner CPTIA Questions and answers with CertsForce

Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
Questions # 11:

Alexis works as an incident responder at XYZ organization. She was asked to identify and attribute the actors behind an attack that occurred recently. For this purpose, she is performing a type of threat attribution that deals with the identification of a specific person, society, or country sponsoring a well-planned and executed intrusion or attack on its target. Which of the following types of threat attributions is Alexis performing?

Options:

A.

Campaign attribution


B.

True attribution


C.

Nation-state attribution


D.

Intrusion set attribution


Expert Solution
Questions # 12:

SWA Cloud Services added PKI as one of their cloud security controls. What does PKI stand for?

Options:

A.

Private key infrastructure


B.

Private key in for ma lion


C.

Public key information


D.

Public key infrastructure


Expert Solution
Questions # 13:

Joe works as a threat intelligence analyst with Xsecurity Inc. He is assessing the TI program by comparing the project results with the original objectives by reviewing project charter. He is also reviewing the list of expected deliverables to ensure that each of those is delivered to an acceptable level of quality.

Identify the activity that Joe is performing to assess a TI program’s success or failure.

Options:

A.

Determining the fulfillment of stakeholders


B.

Identifying areas of further improvement


C.

Determining the costs and benefits associated with the program


D.

Conducting a gap analysis


Expert Solution
Questions # 14:

Which of the following is not a countermeasure to eradicate cloud security incidents?

Options:

A.

Patch the database vulnerabilities and improve the isolation mechanism


B.

Remove the malware files and traces from the affected components


C.

Check for data protection at both design and runtime


D.

Disable security options such as two factor authentication and CAPTCHA


Expert Solution
Questions # 15:

What is the correct sequence of steps involved in scheduling a threat intelligence program?

1. Review the project charter

2. Identify all deliverables

3. Identify the sequence of activities

4. Identify task dependencies

5. Develop the final schedule

6. Estimate duration of each activity

7. Identify and estimate resources for all activities

8. Define all activities

9. Build a work breakdown structure (WBS)

Options:

A.

1-->9-->2-->8-->3-->7-->4-->6-->5


B.

3-->4-->5-->2-->1-->9-->8-->7-->6


C.

1-->2-->3-->4-->5-->6-->9-->8-->7


D.

1-->2-->3-->4-->5-->6-->7-->8-->9


Expert Solution
Questions # 16:

Oscar receives an email from an unknown source containing his domain name oscar.com. Upon checking the link, he found that it contains a malicious URL that redirects to the website evilsite.org. What type of vulnerability is this?

Options:

A.

Malware


B.

Bolen


C.

Unvalidated redirects and forwards


D.

SQL injection


Expert Solution
Questions # 17:

Employee monitoring tools are mostly used by employers to find which of the following?

Options:

A.

Lost registry keys


B.

Conspiracies


C.

Malicious insider threats


D.

Stolen credentials


Expert Solution
Questions # 18:

In a team of threat analysts, two individuals were competing over projecting their own hypotheses on a given malware. However, to find logical proofs to confirm their hypotheses, the threat intelligence manager used a de-biasing strategy that involves learning strategic decision making in the circumstances comprising multistep interactions with numerous representatives, either having or without any perfect relevant information.

Which of the following de-biasing strategies the threat intelligence manager used to confirm their hypotheses?

Options:

A.

Game theory


B.

Machine learning


C.

Decision theory


D.

Cognitive psychology


Expert Solution
Questions # 19:

Which of the following is not the responsibility of first responders?

Options:

A.

Protecting the crime scene


B.

Identifying the crime scene


C.

Packaging and transporting the electronic evidence


D.

Preserving temporary and fragile evidence and then shut down or reboot the victim’s computer


Expert Solution
Questions # 20:

Sam. an employee of a multinational company, sends emails to third-party organizations with a spoofed email address of his organization. How can you categorize this type of incident?

Options:

A.

Network intrusion incident


B.

Inappropriate usage incident


C.

Unauthorized access incident.


D.

Denial-of-service incicent


Expert Solution
Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions