CPTIA Practice Test Questions

135 Questions


Which of the following types of threat attribution deals with the identification of the specific person, society, or a country sponsoring a well-planned and executed intrusion or attack over its target?


A. Nation-state attribution


B. True attribution


C. Campaign attribution


D. Intrusion-set attribution





B.
  True attribution

What is the most recent NIST standard for incident response?


A. 800-61r2


B. 800-61r3


C. 800-53r3


D. 800-171r2





A.
  800-61r2

Enrage Tech Company hired Enrique, a security analyst, for performing threat intelligence analysis. While performing data collection process, he used a counterintelligence mechanism where a recursive DNS server is employed to perform interserver DNS communication and when a request is generated from any name server to the recursive DNS server, the recursive DNS servers log the responses that are received. Then it replicates the logged data and stores the data in the central database. Using these logs, he analyzed the malicious attempts that took place over DNS infrastructure.

Which of the following cyber counterintelligence (CCI) gathering technique has Enrique used for data collection?


A. Data collection through passive DNS monitoring


B. Data collection through DNS interrogation


C. Data collection through DNS zone transfer


D. Data collection through dynamic DNS (DDNS)





A.
  Data collection through passive DNS monitoring

Tracy works as a CISO in a large multinational company. She consumes threat intelligence to understand the changing trends of cyber security. She requires intelligence to understand the current business trends and make appropriate decisions regarding new technologies, security budget, improvement of processes, and staff. The intelligence helps her in minimizing business risks and protecting the new technology and business initiatives.
Identify the type of threat intelligence consumer is Tracy.


A. Tactical users


B. Strategic users


C. Operational users


D. Technical users





B.
  Strategic users

Jian is a member of the security team at Trinity, Inc. He was conducting a real-time assessment of system activities in order to acquire threat intelligence feeds. Heacquired feeds from sources like honeynets, P2P monitoring. infrastructure, and application logs.
Which of the following categories of threat intelligence feed was acquired by Jian?


A. Internal intelligence feeds


B. External intelligence feeds


C. CSV data feeds


D. Proactive surveillance feeds





A.
  Internal intelligence feeds

In a team of threat analysts, two individuals were competing over projecting their own hypotheses on a given malware. However, to find logical proofs to confirm their hypotheses, the threat intelligence manager used a de-biasing strategy that involves learning strategic decision making in the circumstances comprising multistep interactions with numerous representatives, either having or without any perfect relevant information.
Which of the following de-biasing strategies the threat intelligence manager used to confirm their hypotheses?


A. Game theory


B. Machine learning


C. Decision theory


D. Cognitive psychology





A.
  Game theory

Which of the following is not a countermeasure to eradicate cloud security incidents?


A. Patch the database vulnerabilities and improve the isolation mechanism


B. Remove the malware files and traces from the affected components


C. Check for data protection at both design and runtime


D. Disable security options such as two factor authentication and CAPTCHA





D.
  Disable security options such as two factor authentication and CAPTCHA

Eric works as an incident handler at Erinol software systems. He was assigned a task to protect the organization from any kind of DoS/DDoS attacks.
Which of the following tools can be used by Eric to achieve his objective?


A. Incapsula


B. Hydra


C. IDA


D. Wireshark





A.
  Incapsula

Alice, an analyst, shared information with security operation managers and network operations center (NOC) staff for protecting the organizational resources against various threats. Information shared by Alice was highly technical and include threat actor TTPs, malware campaigns, tools used by threat actors, and so on.
Which of the following types of threat intelligence was shared by Alice?


A. Strategic threat intelligence


B. Tactical threat intelligence


C. Technical threat intelligence


D. Operational threat intelligence





B.
  Tactical threat intelligence

An incident handler is analyzing email headers to find out suspicious emails.
Which of the following tools he/she must use in order to accomplish the task?


A. Barracuda Email Security Gateway


B. Gophish


C. SPAMfighter





A.
  Barracuda Email Security Gateway

Elizabeth, who works for OBC organization as an incident responder, is assessing the risks to the organizational security. As part of the assessment process, she is calculating the probability of a threat source exploiting an existing system vulnerability. Which of the following risk assessment steps is Elizabeth currently in?


A. Vulnerability identification


B. Impact analysis


C. Likelihood analysis


D. System characterization





C.
  Likelihood analysis

Jame, a professional hacker, is trying to hack the confidential information of a target organization. He identified the vulnerabilities in the target system and created a tailored deliverable malicious payload using an exploit and a backdoor to send it to the victim.
Which of the following phases of cyber kill chain methodology is Jame executing?


A. Reconnaissance


B. Installation


C. Weaponization


D. Exploitation





C.
  Weaponization


Page 1 out of 12 Pages