CPTIA Practice Test Questions

135 Questions


Kim, an analyst, is looking for an intelligence-sharing platform to gather and share threat information from a variety of sources. He wants to use this information to develop security policies to enhance the overall security posture of his organization.
Which of the following sharing platforms should be used by Kim?


A. Cuckoo sandbox


B. OmniPeek


C. PortDroid network analysis


D. Blueliv threat exchange network





D.
  Blueliv threat exchange network

Bob, a threat analyst, works in an organization named TechTop. He was asked to collect intelligence to fulfil the needs and requirements of the Red Tam present within the organization.
Which of the following are the needs of a RedTeam?


A. Intelligence related to increased attacks targeting a particular software or operating system vulnerability


B. Intelligence on latest vulnerabilities, threat actors, and their tactics, techniques, and procedures (TTPs)


C. Intelligence extracted latest attacks analysis on similar organizations, which includes details about latest threats and TTPs


D. Intelligence that reveals risks related to various strategic business decisions





B.
  Intelligence on latest vulnerabilities, threat actors, and their tactics, techniques, and procedures (TTPs)

Tibson works as an incident responder for MNC based in Singapore. He is investigating a web application security incident recently faced by the company. The attack is performed on a MS SQL Server hosted by the company. In the detection and analysis phase, he used regular expressions to analyze and detect SQL meta-characters that led to SQL injection attack.
Identify the regular expression used by Tibson to detect SQL injection attack on MS SQL Server.


A. /exec(\s|\+)+(s|x)p\w+/ix


B. ((\.\.\\)|(\.\.\/))


C. ((\.|%2E)(\.|%2E)(\/|%2F|\\|%5C))


D. ((\%3C)|<)((\%2F)|\/)*(script)((\%3E)|>)





A.
  /exec(\s|\+)+(s|x)p\w+/ix

Which of the following encoding techniques replaces unusual ASCII characters with "%" followed by the character’s two-digit ASCII code expressed in hexadecimal?


A. URL encoding


B. Unicode encoding


C. Base64 encoding


D. HTML encoding





A.
  URL encoding

Alice, a threat intelligence analyst at HiTech Cyber Solutions, wants to gather information for identifying emerging threats to the organization and implement essential techniques to prevent their systems and networks from such attacks. Alice is searching for online sources to obtain information such as the method used to launch an attack, and techniques and tools used to perform an attack and the procedures followed for covering the tracks after an attack.
Which of the following online sources should Alice use to gather such information?


A. Financial services


B. Social network settings


C. Hacking forums


D. Job sites





C.
  Hacking forums

Which of the following risk mitigation strategies involves execution of controls to reduce the risk factor and brings it to an acceptable level or accepts the potential risk and continues operating the IT system?


A. Risk assumption


B. Risk avoidance


C. Risk planning


D. Risk transference





A.
  Risk assumption

James is a professional hacker and is employed by an organization to exploit their cloud services. In order to achieve this, James created anonymous access to the cloud services to carry out various attacks such as password and key cracking, hosting malicious data, and DDoS attacks. Which of the following threats is he posing to the cloud platform?


A. Insecure interface and APIs


B. Data breach/loss


C. Insufficient duo diligence


D. Abuse end nefarious use of cloud services





D.
  Abuse end nefarious use of cloud services

Tyrion, a professional hacker, is targeting an organization to steal confidential information. He wants to perform website footprinting to obtain the following information, which is hidden in the web page header.

Connection status and content type
Accept-ranges and last-modified information
X-powered-by information
Web server in use and its version

Which of the following tools should the Tyrion use to view header content?


A. Hydra


B. AutoShun


C. Vanguard enforcer


D. Burp suite





D.
  Burp suite

Which of the following risk management processes identifies the risks, estimates the impact, and determines sources to recommend proper mitigation measures?


A. Risk assessment


B. Risk assumption


C. Risk mitigation


D. Risk avoidance





A.
  Risk assessment

BadGuy Bob hid files in the slack space, changed the file headers, hid suspicious files in executables, and changed the metadata for all types of files on his hacker laptop. What has he committed?


A. Anti-forensics


B. Adversarial mechanics


C. Felony


D. Legal hostility





A.
  Anti-forensics

An organization suffered many major attacks and lost critical information, such as employee records, and financial information. Therefore, the management decides to hire a threat analyst to extract the strategic threat intelligence that provides high-level information regarding current cyber-security posture, threats, details on the financial impact of various cyber-activities, and so on.
Which of the following sources will help the analyst to collect the required intelligence?


A. Active campaigns, attacks on other organizations, data feeds from external third parties


B. OSINT, CTI vendors, ISAO/ISACs


C. Campaign reports, malware, incident reports, attack group reports, human intelligence


D. Human, social media, chat rooms





B.
  OSINT, CTI vendors, ISAO/ISACs

A colleague wants to minimize their security responsibility because they are in a small organization. They are evaluating a new application that is offered in different forms. Which form would result in the least amount of responsibility for the colleague?


A. On-prom installation


B. saaS


C. laaS


D. PaaS





B.
  saaS


Page 4 out of 12 Pages
Previous