Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CPTIA CREST Practitioner Threat Intelligence Analyst is now Stable and With Pass Result | Test Your Knowledge for Free

CPTIA Practice Questions

CREST Practitioner Threat Intelligence Analyst

Last Update 4 days ago
Total Questions : 135

Dive into our fully updated and stable CPTIA practice test platform, featuring all the latest CREST Practitioner exam questions added this week. Our preparation tool is more than just a CREST study aid; it's a strategic advantage.

Our free CREST Practitioner practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CPTIA. Use this test to pinpoint which areas you need to focus your study on.

CPTIA PDF

CPTIA PDF (Printable)
$43.75
$124.99

CPTIA Testing Engine

CPTIA PDF (Printable)
$50.75
$144.99

CPTIA PDF + Testing Engine

CPTIA PDF (Printable)
$63.7
$181.99
Question # 21

Alice, a threat intelligence analyst at HiTech Cyber Solutions, wants to gather information for identifying emerging threats to the organization and implement essential techniques to prevent their systems and networks from such attacks. Alice is searching for online sources to obtain information such as the method used to launch an attack, and techniques and tools used to perform an attack and the procedures followed for covering the tracks after an attack.

Which of the following online sources should Alice use to gather such information?

Options:

A.  

Financial services

B.  

Social network settings

C.  

Hacking forums

D.  

Job sites

Discussion 0
Question # 22

Which of the following port scanning techniques involves resetting the TCP connection

between client and server abruptly before completion of the three-way handshake

signals, making the connection half-open?

Options:

A.  

Null scan

B.  

Full connect scan

C.  

Stealth scan

D.  

Xmas scan

Discussion 0
Question # 23

Mr. Smith is a lead incident responder of a small financial enterprise having few

branches in Australia. Recently, the company suffered a massive attack losing USD 5

million through an inter-banking system. After in-depth investigation on the case, it was

found out that the incident occurred because 6 months ago the attackers penetrated the

network through a minor vulnerability and maintained the access without any user

being aware of it. Then, he tried to delete users’ fingerprints and performed a lateral

movement to the computer of a person with privileges in the inter-banking system.

Finally, the attacker gained access and did fraudulent transactions.

Based on the above scenario, identify the most accurate kind of attack.

Options:

A.  

Ransomware attack

B.  

Denial-of-service attack

C.  

APT attack

D.  

Phishing

Discussion 0
Question # 24

Which of the following encoding techniques replaces unusual ASCII characters with

"%" followed by the character’s two-digit ASCII code expressed in hexadecimal?

Options:

A.  

URL encoding

B.  

Unicode encoding

C.  

Base64 encoding

D.  

HTML encoding

Discussion 0
Question # 25

Alison, an analyst in an XYZ organization, wants to retrieve information about a company’s website from the time of its inception as well as the removed information from the target website.

What should Alison do to get the information he needs.

Options:

A.  

Alison should use SmartWhois to extract the required website information.

B.  

Alison should use https://archive.org to extract the required website information.

C.  

Alison should run the Web Data Extractor tool to extract the required website information.

D.  

Alison should recover cached pages of the website from the Google search engine cache to extract the required website information.

Discussion 0
Question # 26

The following steps describe the key activities in forensic readiness planning:

1. Train the staff to handle the incident and preserve the evidence

2. Create a special process for documenting the procedure

3. Identify the potential evidence required for an incident

4. Determine the source of the evidence

5. Establish a legal advisory board to guide the investigation process

6. Identify if the incident requires full or formal investigation

7. Establish a policy for securely handling and storing the collected evidence

8. Define a policy that determines the pathway to legally extract electronic evidence

with minimal disruption

Identify the correct sequence of steps involved in forensic readiness planning.

Options:

A.  

2-->3-->1-->4-->6-->5-->7-->8

B.  

3-->4-->8-->7-->6-->1-->2-->5

C.  

3-->1-->4-->5-->8-->2-->6-->7

D.  

1-->2-->3-->4-->5-->6-->7-->8

Discussion 0
Question # 27

Robert is an incident handler working for Xsecurity Inc. One day, his organization

faced a massive cyberattack and all the websites related to the organization went

offline. Robert was on duty during the incident and he was responsible to handle the

incident and maintain business continuity. He immediately restored the web application

service with the help of the existing backups.

According to the scenario, which of the following stages of incident handling and

response (IH&R) process does Robert performed?

Options:

A.  

Evidence gathering and forensics analysis

B.  

Eradication

C.  

Notification

D.  

Recovery

Discussion 0
Question # 28

Miley, an analyst, wants to reduce the amount of collected data and make the storing and sharing process easy. She uses filtering, tagging, and queuing technique to sort out the relevant and structured data from the large amounts of unstructured data.

Which of the following techniques was employed by Miley?

Options:

A.  

Sandboxing

B.  

Normalization

C.  

Data visualization

D.  

Convenience sampling

Discussion 0
Question # 29

Which of the following components refers to a node in the network that routes the traffic from a workstation to external command and control server and helps in identification of installed malware in the network?

Options:

A.  

Repeater

B.  

Gateway

C.  

Hub

D.  

Network interface card (NIC)

Discussion 0
Question # 30

Which of the following is not a countermeasure to eradicate inappropriate usage

incidents?

Options:

A.  

Avoid VPN and other secure network channels

B.  

Register the user activity logs and keep monitoring them regularly

C.  

Install firewall and IDS/IPS to block services that violate the organization’s policy

D.  

Always store the sensitive data in far located servers and restrict its access

Discussion 0
Get CPTIA dumps and pass your exam in 24 hours!

Free Exams Sample Questions