Bran is an incident handler who is assessing the network of the organization. In the process, he wants to detect ping sweep attempts on the network using Wireshark tool.
Which of the following Wireshark filter he must use to accomplish this task?
A. icmp.redir_gw
B. icmp.type==8
C. icmp.ident
D. icmp.seq
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
Oscar receives an email from an unknown source containing his domain name oscar.com. Upon checking the link, he found that it contains a malicious URL that redirects to the website evilsite.org. What type of vulnerability is this?
A. Malware
B. SQL injection
C. Bolen
D. Unvalidated redirects and forwards
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
Cybersol Technologies initiated a cyber-threat intelligence program with a team of threat intelligence analysts. During the process, the analysts started converting the raw data into useful information by applying various techniques, such as machine-based techniques, and statistical methods.
In which of the following phases of the threat intelligence lifecycle is the threat intelligence team currently working?
A. Planning and direction
B. Dissemination and integration
C. Processing and exploitation
D. Analysis and production
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
A US Federal Agency network was the target of a DoS attack that prevented and impaired the normal authorized functionality of the networks. According to agency's reporting timeframe guidelines, this incident should be reported within 2 h of discovery/detection if the successful attack is still ongoing and the agency is unable to successfully mitigate the activity.
Which incident category of US Federal Agency does this incident belong to?
A. CAT 6
B. CAT 1
C. CAT 5
D. CAT 2
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
Employee monitoring tools are mostly used by employers to find which of the following?
A. Stolen credentials
B. Malicious insider threats
C. Conspiracies
D. Lost registry keys
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 6:
Alice, an analyst, shared information with security operation managers and network operations center (NOC) staff for protecting the organizational resources against various threats. Information shared by Alice was highly technical and include threat actor TTPs, malware campaigns, tools used by threat actors, and so on.
Which of the following types of threat intelligence was shared by Alice?
A. Strategic threat intelligence
B. Tactical threat intelligence
C. Operational threat intelligence
D. Technical threat intelligence
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 7:
For analyzing the system, the browser data can be used to access various credentials.
Which of the following tools is used to analyze the history data files in Microsoft Edge browser?
A. MZCacheView
B. MZHistoryView
C. ChromeHistoryView
D. BrowsingHistoryView
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 8:
James is a professional hacker and is employed by an organization to exploit their cloud services. In order to achieve this, James created anonymous access to the cloud services to carry out various attacks such as password and key cracking, hosting malicious data, and DDoS attacks. Which of the following threats is he posing to the cloud platform?
A. Insufficient duo diligence
B. Data breach/loss
C. Abuse end nefarious use of cloud services
D. Insecure interface and APIs
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 9:
Ren is assigned to handle a security incident of an organization. He is tasked with forensics investigation to find the evidence needed by the management. Which of the following steps falls under the investigation phase of the computer forensics investigation process?
A. Setup a computer forensics lab
B. Evidence assessment
C. Risk assessment
D. Secure the evidence
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
日置** -
CPTIA知識の定着を確認しながら学習を進める方式となっていて、合格力が効率的に身に付きます。。Pass4Testはいいぞ