최신 CPTIA 무료덤프 - CREST Practitioner Threat Intelligence Analyst
Lizzy, an analyst, wants to recognize the level of risks to the organization so as to plan countermeasures against cyber attacks. She used a threat modelling methodology where she performed the following stages:
Stage 1: Build asset-based threat profiles
Stage 2: Identify infrastructure vulnerabilities
Stage 3: Develop security strategy and plans
Which of the following threat modelling methodologies was used by Lizzy in the aforementioned scenario?
Stage 1: Build asset-based threat profiles
Stage 2: Identify infrastructure vulnerabilities
Stage 3: Develop security strategy and plans
Which of the following threat modelling methodologies was used by Lizzy in the aforementioned scenario?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Sarah is a security operations center (SOC) analyst working at JW Williams and Sons organization based in Chicago. As a part of security operations, she contacts information providers (sharing partners) for gathering information such as collections of validated and prioritized threat indicators along with a detailed technical analysis of malware samples, botnets, DDoS attack methods, and various other malicious tools. She further used the collected information at the tactical and operational levels.
Sarah obtained the required information from which of the following types of sharing partner?
Sarah obtained the required information from which of the following types of sharing partner?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Richard is analyzing a corporate network. After an alert in the network's IPS. he identified that all the servers are sending huge amounts of traffic to the website abc.xyz. What type of information security attack vectors have affected the network?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following is an attack that attempts to prevent the use of systems, networks, or applications by the intended users?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Sam received an alert through an email monitoring tool indicating that their company was targeted by a phishing attack. After analyzing the incident, Sam identified that most of the targets of the attack are high- profile executives of the company. What type of phishing attack is this?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following is not a countermeasure to eradicate inappropriate usage incidents?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
SecurityTech Inc. is developing a TI plan where it can drive more advantages in less funds. In the process of selecting a TI platform, it wants to incorporate a feature that ranks elements such as intelligence sources, threat actors, attacks, and digital assets of the organization, so that it can put in more funds toward the resources which are critical for the organization's security.
Which of the following key features should SecurityTech Inc. consider in their TI plan for selecting the TI platform?
Which of the following key features should SecurityTech Inc. consider in their TI plan for selecting the TI platform?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Alex is an incident handler for Tech-o-Tech Inc. and is tasked to identify any possible insider threats within his organization. Which of the following insider threat detection techniques can be used by Alex to detect insider threats based on the behavior of a suspicious employee, both individually and in a group?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Michael is a part of the computer incident response team of a company. One of his responsibilities is to handle email incidents. The company receives an email from an unknown source, and one of the steps that he needs to take is to check the validity of the email. Which of the following tools should he use?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Daniel is a professional hacker whose aim is to attack a system to steal data and money for profit. He performs hacking to obtain confidential data such as social security numbers, personally identifiable information (PII) of an employee, and credit card information. After obtaining confidential data, he further sells the information on the black market to make money.
Daniel comes under which of the following types of threat actor.
Daniel comes under which of the following types of threat actor.
정답: B
설명: (DumpTOP 회원만 볼 수 있음)