최신 CREST Practitioner CPTIA 무료샘플문제:
1. BadGuy Bob hid files in the slack space, changed the file headers, hid suspicious files in executables, and changed the metadata for all types of files on his hacker laptop. What has he committed?
A) Anti-forensics
B) Legal hostility
C) Adversarial mechanics
D) Felony
2. Jame, a professional hacker, is trying to hack the confidential information of a target organization. He identified the vulnerabilities in the target system and created a tailored deliverable malicious payload using an exploit and a backdoor to send it to the victim.
Which of the following phases of cyber kill chain methodology is Jame executing?
A) Reconnaissance
B) Exploitation
C) Installation
D) Weaponization
3. An analyst is conducting threat intelligence analysis in a client organization, and during the information gathering process, he gathered information from the publicly available sources and analyzed to obtain a rich useful form of intelligence. The information source that he used is primarily used for national security, law enforcement, and for collecting intelligence required for business or strategic decision making.
Which of the following sources of intelligence did the analyst use to collect information?
A) OSINT
B) ISAC
C) OPSEC
D) SIGINT
4. In a team of threat analysts, two individuals were competing over projecting their own hypotheses on a given malware. However, to find logical proofs to confirm their hypotheses, the threat intelligence manager used a de-biasing strategy that involves learning strategic decision making in the circumstances comprising multistep interactions with numerous representatives, either having or without any perfect relevant information.
Which of the following de-biasing strategies the threat intelligence manager used to confirm their hypotheses?
A) Game theory
B) Cognitive psychology
C) Decision theory
D) Machine learning
5. A threat analyst obtains an intelligence related to a threat, where the data is sent in the form of a connection request from a remote host to the server. From this data, he obtains only the IP address of the source and destination but no contextual information. While processing this data, he obtains contextual information stating that multiple connection requests from different geo-locations are received by the server within a short time span, and as a result, the server is stressed and gradually its performance has reduced. He further performed analysis on the information based on the past and present experience and concludes the attack experienced by the client organization.
Which of the following attacks is performed on the client organization?
A) Bandwidth attack
B) Distributed Denial-of-Service (DDoS) attack
C) MAC spoofing attack
D) DHCP attacks
질문과 대답:
질문 # 1 정답: A | 질문 # 2 정답: D | 질문 # 3 정답: A | 질문 # 4 정답: A | 질문 # 5 정답: B |