Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CPTIA CREST Practitioner Threat Intelligence Analyst is now Stable and With Pass Result | Test Your Knowledge for Free

CPTIA Practice Questions

CREST Practitioner Threat Intelligence Analyst

Last Update 4 days ago
Total Questions : 135

Dive into our fully updated and stable CPTIA practice test platform, featuring all the latest CREST Practitioner exam questions added this week. Our preparation tool is more than just a CREST study aid; it's a strategic advantage.

Our free CREST Practitioner practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CPTIA. Use this test to pinpoint which areas you need to focus your study on.

CPTIA PDF

CPTIA PDF (Printable)
$43.75
$124.99

CPTIA Testing Engine

CPTIA PDF (Printable)
$50.75
$144.99

CPTIA PDF + Testing Engine

CPTIA PDF (Printable)
$63.7
$181.99
Question # 31

QualTech Solutions is a leading security services enterprise. Dickson, who works as an incident responder with this firm, is performing a vulnerability assessment to identify the security problems in the network by using automated tools for identifying the hosts, services, and vulnerabilities in the enterprise network. In the above scenario, which of the following types of vulnerability assessment is Dickson performing?

Options:

A.  

Active assessment

B.  

External assessment

C.  

Internal assessment

D.  

Passive assessment

Discussion 0
Question # 32

Which of the following is not the responsibility of first responders?

Options:

A.  

Protecting the crime scene

B.  

Identifying the crime scene

C.  

Packaging and transporting the electronic evidence

D.  

Preserving temporary and fragile evidence and then shut down or reboot the victim’s computer

Discussion 0
Question # 33

A threat analyst wants to incorporate a requirement in the threat knowledge repository that provides an ability to modify or delete past or irrelevant threat data.

Which of the following requirement must he include in the threat knowledge repository to fulfil his needs?

Options:

A.  

Protection ranking

B.  

Evaluating performance

C.  

Data management

D.  

Searchable functionality

Discussion 0
Question # 34

Michael, a threat analyst, works in an organization named TechTop, was asked to conduct a cyber-threat intelligence analysis. After obtaining information regarding threats, he has started analyzing the information and understanding the nature of the threats.

What stage of the cyber-threat intelligence is Michael currently in?

Options:

A.  

Unknown unknowns

B.  

Unknowns unknown

C.  

Known unknowns

D.  

Known knowns

Discussion 0
Question # 35

Which stage of the incident response and handling process involves auditing the system and network log files?

Options:

A.  

Containment

B.  

Incident triage

C.  

Incident disclosure

D.  

Incident eradication

Discussion 0
Question # 36

In which of the following storage architecture is the data stored in a localized system, server, or storage hardware and capable of storing a limited amount of data in its database and locally available for data usage?

Options:

A.  

Distributed storage

B.  

Object-based storage

C.  

Centralized storage

D.  

Cloud storage

Discussion 0
Question # 37

James is working as an incident responder at CyberSol Inc. The management instructed James to investigate a cybersecurity incident that recently happened in the company. As a part of the investigation process, James started collecting volatile information from a system running on Windows operating system.

Which of the following commands helps James in determining all the executable files for running processes?

Options:

A.  

cate A &. time ,/t

B.  

netstat -ab

C.  

top

D.  

doskey/history

Discussion 0
Question # 38

A network administrator working in an ABC organization collected log files generated by a traffic monitoring system, which may not seem to have useful information, but afterperforming proper analysis by him, the same information can be used to detect an attack in the network.

Which of the following categories of threat information has he collected?

Options:

A.  

Advisories

B.  

Strategic reports

C.  

Detection indicators

D.  

Low-level data

Discussion 0
Question # 39

Investigator Ian gives you a drive image to investigate. What type of analysis are you performing?

Options:

A.  

Real-time

B.  

Static

C.  

Dynamic

D.  

Live

Discussion 0
Question # 40

Which of the following is an attack that attempts to prevent the use of systems, networks, or applications by the intended users?

Options:

A.  

Denial of service (DoS) attack

B.  

Fraud and theft

C.  

Unauthorized access

D.  

Malicious code or insider threat attack

Discussion 0
Get CPTIA dumps and pass your exam in 24 hours!

Free Exams Sample Questions