Which of the following types of threat attribution deals with the identification of the specific person, society, or a country sponsoring a well-planned and executed intrusion or attack over its target?
A. Nation-state attribution
B. True attribution
C. Campaign attribution
D. Intrusion-set attribution
What is the most recent NIST standard for incident response?
A. 800-61r2
B. 800-61r3
C. 800-53r3
D. 800-171r2
Enrage Tech Company hired Enrique, a security analyst, for performing threat intelligence
analysis. While performing data collection process, he used a counterintelligence
mechanism where a recursive DNS server is employed to perform interserver DNS
communication and when a request is generated from any name server to the recursive
DNS server, the recursive DNS servers log the responses that are received. Then it
replicates the logged data and stores the data in the central database. Using these logs, he
analyzed the malicious attempts that took place over DNS infrastructure.
Which of the following cyber counterintelligence (CCI) gathering technique has Enrique
used for data collection?
A. Data collection through passive DNS monitoring
B. Data collection through DNS interrogation
C. Data collection through DNS zone transfer
D. Data collection through dynamic DNS (DDNS)
Tracy works as a CISO in a large multinational company. She consumes threat intelligence
to understand the changing trends of cyber security. She requires intelligence to
understand the current business trends and make appropriate decisions regarding new
technologies, security budget, improvement of processes, and staff. The intelligence helps
her in minimizing business risks and protecting the new technology and business initiatives.
Identify the type of threat intelligence consumer is Tracy.
A. Tactical users
B. Strategic users
C. Operational users
D. Technical users
Jian is a member of the security team at Trinity, Inc. He was conducting a real-time
assessment of system activities in order to acquire threat intelligence feeds. Heacquired
feeds from sources like honeynets, P2P monitoring. infrastructure, and application logs.
Which of the following categories of threat intelligence feed was acquired by Jian?
A. Internal intelligence feeds
B. External intelligence feeds
C. CSV data feeds
D. Proactive surveillance feeds
In a team of threat analysts, two individuals were competing over projecting their own
hypotheses on a given malware. However, to find logical proofs to confirm their
hypotheses, the threat intelligence manager used a de-biasing strategy that involves learning strategic decision making in the circumstances comprising multistep interactions
with numerous representatives, either having or without any perfect relevant information.
Which of the following de-biasing strategies the threat intelligence manager used to confirm
their hypotheses?
A. Game theory
B. Machine learning
C. Decision theory
D. Cognitive psychology
Which of the following is not a countermeasure to eradicate cloud security incidents?
A. Patch the database vulnerabilities and improve the isolation mechanism
B. Remove the malware files and traces from the affected components
C. Check for data protection at both design and runtime
D. Disable security options such as two factor authentication and CAPTCHA
Eric works as an incident handler at Erinol software systems. He was assigned a task to
protect the organization from any kind of DoS/DDoS attacks.
Which of the following tools can be used by Eric to achieve his objective?
A. Incapsula
B. Hydra
C. IDA
D. Wireshark
Alice, an analyst, shared information with security operation managers and network
operations center (NOC) staff for protecting the organizational resources against various
threats. Information shared by Alice was highly technical and include threat actor TTPs,
malware campaigns, tools used by threat actors, and so on.
Which of the following types of threat intelligence was shared by Alice?
A. Strategic threat intelligence
B. Tactical threat intelligence
C. Technical threat intelligence
D. Operational threat intelligence
An incident handler is analyzing email headers to find out suspicious emails.
Which of the following tools he/she must use in order to accomplish the task?
A. Barracuda Email Security Gateway
B. Gophish
C. SPAMfighter
Elizabeth, who works for OBC organization as an incident responder, is assessing the risks to the organizational security. As part of the assessment process, she is calculating the probability of a threat source exploiting an existing system vulnerability. Which of the following risk assessment steps is Elizabeth currently in?
A. Vulnerability identification
B. Impact analysis
C. Likelihood analysis
D. System characterization
Jame, a professional hacker, is trying to hack the confidential information of a target
organization. He identified the vulnerabilities in the target system and created a tailored
deliverable malicious payload using an exploit and a backdoor to send it to the victim.
Which of the following phases of cyber kill chain methodology is Jame executing?
A. Reconnaissance
B. Installation
C. Weaponization
D. Exploitation
Page 1 out of 12 Pages |