Pass the CREST CREST Practitioner CPTIA Questions and answers with CertsForce

Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
Questions # 21:

An attack on a network is BEST blocked using which of the following?

Options:

A.

IPS device inline


B.

HIPS


C.

Web proxy


D.

Load balancer


Expert Solution
Questions # 22:

Sarah is a security operations center (SOC) analyst working at JW Williams and Sons organization based in Chicago. As a part of security operations, she contacts information providers (sharing partners) for gathering information such as collections of validated and prioritized threat indicators along with a detailed technical analysis of malware samples, botnets, DDoS attack methods, and various other malicious tools. She further used the collected information at the tactical and operational levels.

Sarah obtained the required information from which of the following types of sharing partner?

Options:

A.

Providers of threat data feeds


B.

Providers of threat indicators


C.

Providers of comprehensive cyber-threat intelligence


D.

Providers of threat actors


Expert Solution
Questions # 23:

Alison, an analyst in an XYZ organization, wants to retrieve information about a company’s website from the time of its inception as well as the removed information from the target website.

What should Alison do to get the information he needs.

Options:

A.

Alison should use SmartWhois to extract the required website information.


B.

Alison should use https://archive.org to extract the required website information.


C.

Alison should run the Web Data Extractor tool to extract the required website information.


D.

Alison should recover cached pages of the website from the Google search engine cache to extract the required website information.


Expert Solution
Questions # 24:

Sam received an alert through an email monitoring tool indicating that their company was targeted by a phishing attack. After analyzing the incident, Sam identified that most of the targets of the attack are high-profile executives of the company. What type of phishing attack is this?

Options:

A.

Pharming


B.

Whaling


C.

Puddle phishing


D.

Spear phishing


Expert Solution
Questions # 25:

An analyst is conducting threat intelligence analysis in a client organization, and during the information gathering process, he gathered information from the publicly available sources and analyzed to obtain a rich useful form of intelligence. The information source that he used is primarily used for national security, law enforcement, and for collecting intelligence required for business or strategic decision making.

Which of the following sources of intelligence did the analyst use to collect information?

Options:

A.

OPSEC


B.

ISAC


C.

OSINT


D.

SIGINT


Expert Solution
Questions # 26:

Moses, a threat intelligence analyst at InfoTec Inc., wants to find crucial information about the potential threats the organization is facing by using advanced Google searchoperators. He wants to identify whether any fake websites are hosted at the similar to the organization’s URL.

Which of the following Google search queries should Moses use?

Options:

A.

related: www.infothech.org


B.

info: www.infothech.org


C.

link: www.infothech.org


D.

cache: www.infothech.org


Expert Solution
Questions # 27:

Dan is a newly appointed information security professional in a renowned organization. He is supposed to follow multiple security strategies to eradicate malware incidents. Which of the following is not considered as a good practice for maintaining information security and eradicating malware incidents?

Options:

A.

Do not download or execute applications from third-party sources


B.

Do not click on web browser pop-up windows


C.

Do not open files with file extensions such as .bat, .com, ,exe, .pif, .vbs, and so on


D.

Do not download or execute applications from trusted sources


Expert Solution
Questions # 28:

Which of the following is a technique used by attackers to make a message difficult to understand through the use of ambiguous language?

Options:

A.

Steganography


B.

Spoofing


C.

Encryption


D.

Obfuscation


Expert Solution
Questions # 29:

Which of the following types of threat attribution deals with the identification of the specific person, society, or a country sponsoring a well-planned and executed intrusion or attack over its target?

Options:

A.

Nation-state attribution


B.

True attribution


C.

Campaign attribution


D.

Intrusion-set attribution


Expert Solution
Questions # 30:

During the vulnerability assessment phase, the incident responders perform various

steps as below:

1. Run vulnerability scans using tools

2. Identify and prioritize vulnerabilities

3. Examine and evaluate physical security

4. Perform OSINT information gathering to validate the vulnerabilities

5. Apply business and technology context to scanner results

6. Check for misconfigurations and human errors

7. Create a vulnerability scan report

Identify the correct sequence of vulnerability assessment steps performed by the

incident responders.

Options:

A.

3-->6-->1-->2-->5-->4-->7


B.

1-->3-->2-->4-->5-->6-->7


C.

4-->1-->2-->3-->6-->5-->7


D.

2-->1-->4-->7-->5-->6-->3


Expert Solution
Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions