Last Update 7 hours ago Total Questions : 135
The CREST Practitioner Threat Intelligence Analyst content is now fully updated, with all current exam questions added 7 hours ago. Deciding to include CPTIA practice exam questions in your study plan goes far beyond basic test preparation.
You'll find that our CPTIA exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CPTIA sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any CREST Practitioner Threat Intelligence Analyst practice test comfortably within the allotted time.
An organization suffered many major attacks and lost critical information, such as employee records, and financial information. Therefore, the management decides to hire a threat analyst to extract the strategic threat intelligence that provides high-level information regarding current cyber-security posture, threats, details on the financial impact of various cyber-activities, and so on.
Which of the following sources will help the analyst to collect the required intelligence?
In which of the following phases of incident handling and response (IH & R) process the identified security incidents are analyzed, validated, categorized, and prioritized?
Mike is an incident handler for PNP Infosystems Inc. One day, there was a ticket submitted regarding a critical incident and Mike was assigned to handle the incident. During the process of incident handling, at one stage, he performed incident analysis and validation to check whether the incident is a genuine incident or a false positive.
Identify the stage he is currently in.
In which of the following phases of the incident handling and response (IH & R) process is the identified security incidents analyzed, validated, categorized, and prioritized?
Which of the following GPG18 and Forensic readiness planning (SPF) principles states
that “organizations should adopt a scenario based Forensic Readiness Planning
approach that learns from experience gained within the business”?
Which of the following tools helps incident responders effectively contain a potential cloud security incident and gather required forensic evidence?
Which of the following is not called volatile data?
Johnson an incident handler is working on a recent web application attack faced by the
organization. As part of this process, he performed data preprocessing in order to
analyzing and detecting the watering hole attack. He preprocessed the outbound
network traffic data collected from firewalls and proxy servers and started analyzing
the user activities within a certain time period to create time-ordered domain sequences
to perform further analysis on sequential patterns.
Identify the data-preprocessing step performed by Johnson.
Kim, an analyst, is looking for an intelligence-sharing platform to gather and share threat information from a variety of sources. He wants to use this information to develop security policies to enhance the overall security posture of his organization.
Which of the following sharing platforms should be used by Kim?
John, a professional hacker, is trying to perform APT attack on the target organization network. He gains access to a single system of a target organization and tries to obtain administrative login credentials to gain further access to the systems in the network using various techniques.
What phase of the advanced persistent threat lifecycle is John currently in?
