Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CPTIA CREST Practitioner Threat Intelligence Analyst is now Stable and With Pass Result | Test Your Knowledge for Free

CPTIA Practice Questions

CREST Practitioner Threat Intelligence Analyst

Last Update 4 days ago
Total Questions : 135

Dive into our fully updated and stable CPTIA practice test platform, featuring all the latest CREST Practitioner exam questions added this week. Our preparation tool is more than just a CREST study aid; it's a strategic advantage.

Our free CREST Practitioner practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CPTIA. Use this test to pinpoint which areas you need to focus your study on.

CPTIA PDF

CPTIA PDF (Printable)
$43.75
$124.99

CPTIA Testing Engine

CPTIA PDF (Printable)
$50.75
$144.99

CPTIA PDF + Testing Engine

CPTIA PDF (Printable)
$63.7
$181.99
Question # 11

Which of the following risk management processes identifies the risks, estimates the impact, and determines sources to recommend proper mitigation measures?

Options:

A.  

Risk assessment

B.  

Risk assumption

C.  

Risk mitigation

D.  

Risk avoidance

Discussion 0
Question # 12

In which of the following phases of incident handling and response (IH&R) process the identified security incidents are analyzed, validated, categorized, and prioritized?

Options:

A.  

Incident recording and assignment

B.  

Containment

C.  

Notification

D.  

Incident triage

Discussion 0
Question # 13

Stanley works as an incident responder at a top MNC based out of Singapore. He was asked to investigate a cybersecurity incident that recently occurred in the company.

While investigating the crime, he collected the evidence from the victim systems. He must present this evidence in a clear and comprehensible manner to the members of

jury so that the evidence explains the facts clearly and further helps in obtaining an expert opinion on the same to confirm the investigation process.

In the above scenario, what is the characteristic of the digital evidence Stanley tried to preserve?

Options:

A.  

Believable

B.  

Complete

C.  

Authentic

D.  

Admissible

Discussion 0
Question # 14

During the process of detecting and containing malicious emails, incident responders

should examine the originating IP address of the emails.

The steps to examine the originating IP address are as follow:

1. Search for the IP in the WHOIS database

2. Open the email to trace and find its header

3. Collect the IP address of the sender from the header of the received mail

4. Look for the geographic address of the sender in the WHOIS database

Identify the correct sequence of steps to be performed by the incident responders to

examine originating IP address of the emails.

Options:

A.  

4-->1-->2-->3

B.  

2-->1-->4-->3

C.  

1-->3-->2-->4

D.  

2-->3-->1-->4

Discussion 0
Question # 15

Sam works as an analyst in an organization named InfoTech Security. He was asked to collect information from various threat intelligence sources. In meeting the deadline, he forgot to verify the threat intelligence sources and used data from an open-source data provider, who offered it at a very low cost. Through it was beneficial at the initial stage but relying on such data providers can produce unreliable data and noise putting the organization network into risk.

What mistake Sam did that led to this situation?

Options:

A.  

Sam used unreliable intelligence sources.

B.  

Sam used data without context.

C.  

Sam did not use the proper standardization formats for representing threat data.

D.  

Sam did not use the proper technology to use or consume the information.

Discussion 0
Question # 16

SWA Cloud Services added PKI as one of their cloud security controls. What does PKI stand for?

Options:

A.  

Private key infrastructure

B.  

Private key in for ma lion

C.  

Public key information

D.  

Public key infrastructure

Discussion 0
Question # 17

SecurityTech Inc. is developing a TI plan where it can drive more advantages in less funds. In the process of selecting a TI platform, it wants to incorporate a feature that ranks elements such as intelligence sources, threat actors, attacks, and digital assets of the organization, so that it can put in more funds toward the resources which are critical for the organization’s security.

Which of the following key features should SecurityTech Inc. consider in their TI plan for selecting the TI platform?

Options:

A.  

Search

B.  

Open

C.  

Workflow

D.  

Scoring

Discussion 0
Question # 18

Darwin is an attacker residing within the organization and is performing network

sniffing by running his system in promiscuous mode. He is capturing and viewing all

the network packets transmitted within the organization. Edwin is an incident handler

in the same organization.

In the above situation, which of the following Nmap commands Edwin must use to

detect Darwin’s system that is running in promiscuous mode?

Options:

A.  

nmap -sV -T4 -O -F –version-light

B.  

nmap –sU –p 500

C.  

nmap --script=sniffer-detect [Target IP Address/Range of IP addresses]

D.  

nmap --script hostmap

Discussion 0
Question # 19

John is a professional hacker who is performing an attack on the target organization where he tries to redirect the connection between the IP address and its target server such that when the users type in the Internet address, it redirects them to a rogue website that resembles the original website. He tries this attack using cache poisoning technique. Identify the type of attack John is performing on the target organization.

Options:

A.  

War driving

B.  

Pharming

C.  

Skimming

D.  

Pretexting

Discussion 0
Question # 20

Identify Sarbanes–Oxley Act (SOX) Title, which consists of only one section, that includes measures designed to help restore investor confidence in the reporting of

securities analysts.

Options:

A.  

Title VIII: Corporate and Criminal Fraud Accountability

B.  

Title V: Analyst Conflicts of Interest

C.  

Title VII: Studies and Reports

D.  

Title IX: White-Collar-Crime Penalty Enhancement

Discussion 0
Get CPTIA dumps and pass your exam in 24 hours!

Free Exams Sample Questions