Pass the CREST CREST Practitioner CPTIA Questions and answers with CertsForce

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions
Questions # 31:

James is working as an incident responder at CyberSol Inc. The management instructed James to investigate a cybersecurity incident that recently happened in the company. As a part of the investigation process, James started collecting volatile information from a system running on Windows operating system.

Which of the following commands helps James in determining all the executable files for running processes?

Options:

A.

cate A &. time ,/t


B.

netstat -ab


C.

top


D.

doskey/history


Expert Solution
Questions # 32:

Which of the following risk management processes identifies the risks, estimates the impact, and determines sources to recommend proper mitigation measures?

Options:

A.

Risk assessment


B.

Risk assumption


C.

Risk mitigation


D.

Risk avoidance


Expert Solution
Questions # 33:

A network administrator working in an ABC organization collected log files generated by a traffic monitoring system, which may not seem to have useful information, but afterperforming proper analysis by him, the same information can be used to detect an attack in the network.

Which of the following categories of threat information has he collected?

Options:

A.

Advisories


B.

Strategic reports


C.

Detection indicators


D.

Low-level data


Expert Solution
Questions # 34:

John, a professional hacker, is trying to perform APT attack on the target organization network. He gains access to a single system of a target organization and tries to obtain administrative login credentials to gain further access to the systems in the network using various techniques.

What phase of the advanced persistent threat lifecycle is John currently in?

Options:

A.

Initial intrusion


B.

Search and exfiltration


C.

Expansion


D.

Persistence


Expert Solution
Questions # 35:

Tracy works as a CISO in a large multinational company. She consumes threat intelligence to understand the changing trends of cyber security. She requires intelligence to understand the current business trends and make appropriate decisions regarding new technologies, security budget, improvement of processes, and staff. The intelligence helps her in minimizing business risks and protecting the new technology and business initiatives.

Identify the type of threat intelligence consumer is Tracy.

Options:

A.

Tactical users


B.

Strategic users


C.

Operational users


D.

Technical users


Expert Solution
Questions # 36:

Which of the following risk mitigation strategies involves execution of controls to

reduce the risk factor and brings it to an acceptable level or accepts the potential risk

and continues operating the IT system?

Options:

A.

Risk assumption


B.

Risk avoidance


C.

Risk planning


D.

Risk transference


Expert Solution
Questions # 37:

Ren is assigned to handle a security incident of an organization. He is tasked with forensics investigation to find the evidence needed by the management. Which of the following steps falls under the investigation phase of the computer forensics investigation process?

Options:

A.

Secure the evidence


B.

Risk assessment


C.

Setup a computer forensics lab


D.

Evidence assessment


Expert Solution
Questions # 38:

A team of threat intelligence analysts is performing threat analysis on malware, and each of them has come up with their own theory and evidence to support their theory on a given malware.

Now, to identify the most consistent theory out of all the theories, which of the following analytic processes must threat intelligence manager use?

Options:

A.

Threat modelling


B.

Application decomposition and analysis (ADA)


C.

Analysis of competing hypotheses (ACH)


D.

Automated technical analysis


Expert Solution
Questions # 39:

Which of the following tools helps incident responders effectively contain a potential cloud security incident and gather required forensic evidence?

Options:

A.

Alert Logic


B.

CloudPassage Quarantine


C.

Qualys Cloud Platform


D.

Cloud Passage Halo


Expert Solution
Questions # 40:

Which of the following is an attack that occurs when a malicious program causes a user’s browser to perform an unwanted action on a trusted site for which the user is currently authenticated?

Options:

A.

Cross-site scripting


B.

Insecure direct object references


C.

Cross-site request forgery


D.

SQL injection


Expert Solution
Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions