Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

CREST Practitioner Threat Intelligence Analyst

Last Update 6 hours ago Total Questions : 135

The CREST Practitioner Threat Intelligence Analyst content is now fully updated, with all current exam questions added 6 hours ago. Deciding to include CPTIA practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CPTIA exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CPTIA sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any CREST Practitioner Threat Intelligence Analyst practice test comfortably within the allotted time.

Question # 1

Which of the following risk management processes identifies the risks, estimates the impact, and determines sources to recommend proper mitigation measures?

A.

Risk assessment

B.

Risk assumption

C.

Risk mitigation

D.

Risk avoidance

Question # 2

Eric works as an incident handler at Erinol software systems. He was assigned a task to protect the organization from any kind of DoS/DDoS attacks.

Which of the following tools can be used by Eric to achieve his objective?

A.

Incapsula

B.

Hydra

C.

IDA

D.

Wireshark

Question # 3

Robert is an incident handler working for Xsecurity Inc. One day, his organization

faced a massive cyberattack and all the websites related to the organization went

offline. Robert was on duty during the incident and he was responsible to handle the

incident and maintain business continuity. He immediately restored the web application

service with the help of the existing backups.

According to the scenario, which of the following stages of incident handling and

response (IH & R) process does Robert performed?

A.

Evidence gathering and forensics analysis

B.

Eradication

C.

Notification

D.

Recovery

Question # 4

Alex is an incident handler for Tech-o-Tech Inc. and is tasked to identify any possible insider threats within his organization. Which of the following insider threat detection techniques can be used by Alex to detect insider threats based on the behavior of a suspicious employee, both individually and in a group?

A.

behaviorial analysis

B.

Physical detection

C.

Profiling

D.

Mole detection

Question # 5

Eric works as a system administrator in ABC organization. He granted privileged users with unlimited permissions to access the systems. These privileged users can misuse

their rights unintentionally or maliciously or attackers can trick them to perform malicious activities.

Which of the following guidelines helps incident handlers to eradicate insider attacks by privileged users?

A.

Do not use encryption methods to prevent administrators and privileged users from accessing backup tapes and sensitive information

B.

Do not control the access to administrators and privileged users

C.

Do not enable the default administrative accounts to ensure accountability

D.

Do not allow administrators to use unique accounts during the installation process

Question # 6

A threat analyst wants to incorporate a requirement in the threat knowledge repository that provides an ability to modify or delete past or irrelevant threat data.

Which of the following requirement must he include in the threat knowledge repository to fulfil his needs?

A.

Protection ranking

B.

Evaluating performance

C.

Data management

D.

Searchable functionality

Question # 7

Alice, a threat intelligence analyst at HiTech Cyber Solutions, wants to gather information for identifying emerging threats to the organization and implement essential techniques to prevent their systems and networks from such attacks. Alice is searching for online sources to obtain information such as the method used to launch an attack, and techniques and tools used to perform an attack and the procedures followed for covering the tracks after an attack.

Which of the following online sources should Alice use to gather such information?

A.

Financial services

B.

Social network settings

C.

Hacking forums

D.

Job sites

Question # 8

An analyst is conducting threat intelligence analysis in a client organization, and during the information gathering process, he gathered information from the publicly available sources and analyzed to obtain a rich useful form of intelligence. The information source that he used is primarily used for national security, law enforcement, and for collecting intelligence required for business or strategic decision making.

Which of the following sources of intelligence did the analyst use to collect information?

A.

OPSEC

B.

ISAC

C.

OSINT

D.

SIGINT

Question # 9

Rinni is an incident handler and she is performing memory dump analysis.

Which of following tools she can use in order to perform memory dump analysis?

A.

OllyDbg and IDA Pro

B.

Scylla and OllyDumpEx

C.

Procmon and ProcessExplorer

D.

iNetSim

Question # 10

Which of the following types of threat attribution deals with the identification of the specific person, society, or a country sponsoring a well-planned and executed intrusion or attack over its target?

A.

Nation-state attribution

B.

True attribution

C.

Campaign attribution

D.

Intrusion-set attribution

Go to page: