최신 CPTIA 무료덤프 - CREST Practitioner Threat Intelligence Analyst
Ren is assigned to handle a security incident of an organization. He is tasked with forensics investigation to find the evidence needed by the management. Which of the following steps falls under the investigation phase of the computer forensics investigation process?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
A team of threat intelligence analysts is performing threat analysis on malware, and each of them has come up with their own theory and evidence to support their theory on a given malware.
Now, to identify the most consistent theory out of all the theories, which of the following analytic processes must threat intelligence manager use?
Now, to identify the most consistent theory out of all the theories, which of the following analytic processes must threat intelligence manager use?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following has been used to evade IDS and IPS?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Allan performed a reconnaissance attack on his corporate network as part of a red-team activity. He scanned the IP range to find live host IP addresses. What type of technique did he use to exploit the network?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
An attacker instructs bots to use camouflage mechanism to hide his phishing and malware delivery locations in the rapidly changing network of compromised bots. In this particular technique, a single domain name consists of multiple IP addresses.
Which of the following technique is used by the attacker?
Which of the following technique is used by the attacker?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following risk mitigation strategies involves execution of controls to reduce the risk factor and brings it to an acceptable level or accepts the potential risk and continues operating the IT system?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
In which of the following phases of incident handling and response (IH&R) process the identified security incidents are analyzed, validated, categorized, and prioritized?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Bob, a threat analyst, works in an organization named TechTop. He was asked to collect intelligence to fulfil the needs and requirements of the Red Tam present within the organization.
Which of the following are the needs of a RedTeam?
Which of the following are the needs of a RedTeam?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
In which of the following phases of the incident handling and response (IH&R) process is the identified security incidents analyzed, validated, categorized, and prioritized?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Johnson an incident handler is working on a recent web application attack faced by the organization. As part of this process, he performed data preprocessing in order to analyzing and detecting the watering hole attack. He preprocessed the outbound network traffic data collected from firewalls and proxy servers and started analyzing the user activities within a certain time period to create time-ordered domain sequences to perform further analysis on sequential patterns.
Identify the data-preprocessing step performed by Johnson.
Identify the data-preprocessing step performed by Johnson.
정답: A
설명: (DumpTOP 회원만 볼 수 있음)