CPTIA Practice Questions
CREST Practitioner Threat Intelligence Analyst
Last Update 4 days ago
Total Questions : 135
Dive into our fully updated and stable CPTIA practice test platform, featuring all the latest CREST Practitioner exam questions added this week. Our preparation tool is more than just a CREST study aid; it's a strategic advantage.
Our free CREST Practitioner practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CPTIA. Use this test to pinpoint which areas you need to focus your study on.
Alice, a threat intelligence analyst at HiTech Cyber Solutions, wants to gather information for identifying emerging threats to the organization and implement essential techniques to prevent their systems and networks from such attacks. Alice is searching for online sources to obtain information such as the method used to launch an attack, and techniques and tools used to perform an attack and the procedures followed for covering the tracks after an attack.
Which of the following online sources should Alice use to gather such information?
Which of the following port scanning techniques involves resetting the TCP connection
between client and server abruptly before completion of the three-way handshake
signals, making the connection half-open?
Mr. Smith is a lead incident responder of a small financial enterprise having few
branches in Australia. Recently, the company suffered a massive attack losing USD 5
million through an inter-banking system. After in-depth investigation on the case, it was
found out that the incident occurred because 6 months ago the attackers penetrated the
network through a minor vulnerability and maintained the access without any user
being aware of it. Then, he tried to delete users’ fingerprints and performed a lateral
movement to the computer of a person with privileges in the inter-banking system.
Finally, the attacker gained access and did fraudulent transactions.
Based on the above scenario, identify the most accurate kind of attack.
Which of the following encoding techniques replaces unusual ASCII characters with
"%" followed by the character’s two-digit ASCII code expressed in hexadecimal?
Alison, an analyst in an XYZ organization, wants to retrieve information about a company’s website from the time of its inception as well as the removed information from the target website.
What should Alison do to get the information he needs.
The following steps describe the key activities in forensic readiness planning:
1. Train the staff to handle the incident and preserve the evidence
2. Create a special process for documenting the procedure
3. Identify the potential evidence required for an incident
4. Determine the source of the evidence
5. Establish a legal advisory board to guide the investigation process
6. Identify if the incident requires full or formal investigation
7. Establish a policy for securely handling and storing the collected evidence
8. Define a policy that determines the pathway to legally extract electronic evidence
with minimal disruption
Identify the correct sequence of steps involved in forensic readiness planning.
Robert is an incident handler working for Xsecurity Inc. One day, his organization
faced a massive cyberattack and all the websites related to the organization went
offline. Robert was on duty during the incident and he was responsible to handle the
incident and maintain business continuity. He immediately restored the web application
service with the help of the existing backups.
According to the scenario, which of the following stages of incident handling and
response (IH&R) process does Robert performed?
Miley, an analyst, wants to reduce the amount of collected data and make the storing and sharing process easy. She uses filtering, tagging, and queuing technique to sort out the relevant and structured data from the large amounts of unstructured data.
Which of the following techniques was employed by Miley?
Which of the following components refers to a node in the network that routes the traffic from a workstation to external command and control server and helps in identification of installed malware in the network?
Which of the following is not a countermeasure to eradicate inappropriate usage
incidents?
