Tyrion, a professional hacker, is targeting an organization to steal confidential information. He wants to perform website footprinting to obtain the following information, which is hidden in the web page header.
Connection status and content type
Accept-ranges and last-modified information
X-powered-by information
Web server in use and its version
Which of the following tools should the Tyrion use to view header content?
A. Burp suite
B. AutoShun
C. Vanguard enforcer
D. Hydra
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
During the process of threat intelligence analysis, John, a threat analyst, successfully extracted an indication of adversary's information, such as Modus operandi, tools, communication channels, and forensics evasion strategies used by adversaries.
Identify the type of threat intelligence analysis is performed by John.
A. Strategic threat intelligence analysis
B. Operational threat intelligence analysis
C. Tactical threat intelligence analysis
D. Technical threat intelligence analysis
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
H&P, Inc. is a small-scale organization that has decided to outsource the network security monitoring due to lack of resources in the organization. They are looking for the options where they can directly incorporate threat intelligence into their existing network defense solutions.
Which of the following is the most cost-effective methods the organization can employ?
A. Look for an individual within the organization
B. Recruit managed security service providers (MSSP)
C. Recruit data management solution provider
D. Recruit the right talent
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
Moses, a threat intelligence analyst at InfoTec Inc., wants to find crucial information about the potential threats the organization is facing by using advanced Google searchoperators. He wants to identify whether any fake websites are hosted at the similar to the organization's URL.
Which of the following Google search queries should Moses use?
A. info: www.infothech.org
B. link: www.infothech.org
C. cache: www.infothech.org
D. related: www.infothech.org
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
Enrage Tech Company hired Enrique, a security analyst, for performing threat intelligence analysis. While performing data collection process, he used a counterintelligence mechanism where a recursive DNS server is employed to perform interserver DNS communication and when a request is generated from any name server to the recursive DNS server, the recursive DNS servers log the responses that are received. Then it replicates the logged data and stores the data in the central database. Using these logs, he analyzed the malicious attempts that took place over DNS infrastructure.
Which of the following cyber counterintelligence (CCI) gathering technique has Enrique used for data collection?
A. Data collection through passive DNS monitoring
B. Data collection through dynamic DNS (DDNS)
C. Data collection through DNS zone transfer
D. Data collection through DNS interrogation
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
森ひ** -
312-85初心者ですが、この問題集を読んで基礎を理解することができました。素敵な問題集です。