최신 CPTIA 무료덤프 - CREST Practitioner Threat Intelligence Analyst
Which of the following is not called volatile data?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following has been used to evade IDS and IPS?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Oscar receives an email from an unknown source containing his domain name oscar.com. Upon checking the link, he found that it contains a malicious URL that redirects to the website evilsite.org. What type of vulnerability is this?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Elizabeth, who works for OBC organization as an incident responder, is assessing the risks to the organizational security. As part of the assessment process, she is calculating the probability of a threat source exploiting an existing system vulnerability. Which of the following risk assessment steps is Elizabeth currently in?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
The following steps describe the key activities in forensic readiness planning:
1. Train the staff to handle the incident and preserve the evidence
2. Create a special process for documenting the procedure
3. Identify the potential evidence required for an incident
4. Determine the source of the evidence
5. Establish a legal advisory board to guide the investigation process
6. Identify if the incident requires full or formal investigation
7. Establish a policy for securely handling and storing the collected evidence
8. Define a policy that determines the pathway to legally extract electronic evidence with minimal disruption Identify the correct sequence of steps involved in forensic readiness planning.
1. Train the staff to handle the incident and preserve the evidence
2. Create a special process for documenting the procedure
3. Identify the potential evidence required for an incident
4. Determine the source of the evidence
5. Establish a legal advisory board to guide the investigation process
6. Identify if the incident requires full or formal investigation
7. Establish a policy for securely handling and storing the collected evidence
8. Define a policy that determines the pathway to legally extract electronic evidence with minimal disruption Identify the correct sequence of steps involved in forensic readiness planning.
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
In which of the following forms of bulk data collection are large amounts of data first collected from multiple sources in multiple formats and then processed to achieve threat intelligence?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
For analyzing the system, the browser data can be used to access various credentials.
Which of the following tools is used to analyze the history data files in Microsoft Edge browser?
Which of the following tools is used to analyze the history data files in Microsoft Edge browser?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
An attack on a network is BEST blocked using which of the following?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Mike is an incident handler for PNP Infosystems Inc. One day, there was a ticket submitted regarding a critical incident and Mike was assigned to handle the incident. During the process of incident handling, at one stage, he performed incident analysis and validation to check whether the incident is a genuine incident or a false positive.
Identify the stage he is currently in.
Identify the stage he is currently in.
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)