ログイン

13 ) EX. 12 | COMPLETE
89問 • 6ヶ月前
  • The R.S.S.H Delivery Company
  • 通報

    問題一覧

  • 1

    Which of the following security policies could help detect fraudulent cases that occur even when other security controls are already in place?

    - Mandatory vacations

  • 2

    This is the concept of having more than one person required to complete a particular task to prevent fraud and error.

    - Separation of duties

  • 3

    This, instead, requires both people to act together. For example, a nuclear missile system uses dual control and requires two people to each turn a different key simultaneously to allow for a missile launch to occur.

    - Dual control

  • 4

    This is the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities.

    - Least privilege

  • 5

    Which law requires government agencies and other organizations that operate systems on behalf of government agencies to comply with security standards?

    - FISMA

  • 6

    This is a United States federal law that imposes certain requirements on operators of websites or online services directed to children under 13 years of age and on operators of other websites or online services that have actual knowledge that they are collecting personal information online from a child under 13 years of age.

    - COPPA

  • 7

    This is a United States federal law that set new or expanded requirements for all U.S. public company boards, management, and public accounting firms.

    - SOX

  • 8

    This a United States federal law designed to provide privacy standards to protect patients' medical records and other health information provided to health plans, doctors, hospitals, and other health care providers.

    - HIPPA

  • 9

    An organization is conducting a cybersecurity training exercise. What team is Jason assigned to if he has been asked to monitor and manage the defenders' and attackers' technical environment during the exercise?

    - White team

  • 10

    This team is made up of both the blue and red teams to work together to maximize their cyber capabilities through continuous feedback and knowledge transfer between attackers and defenders.

    - Purple team

  • 11

    This team is a group of people responsible for defending an enterprise’s use of information systems by maintaining its security posture against a group of mock attackers.

    - Blue team

  • 12

    This team is a group of people authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s security posture.

    - Red team

  • 13

    Your incident response team has identified a persistent threat actor who has used a spear-phishing attack to compromise a system in your network. The actor used this system to move laterally within the network, stealing sensitive data. The team wants to understand the relationship between the adversary, the victim system, the phishing infrastructure used by the attacker, and the lateral movement capability. Which framework would best help them in this analysis?

    - Diamond Model of Intrusion Analysis

  • 14

    This describes the stages of a cyber attack, but it does not specifically analyze the relationships between the adversary, victim, infrastructure, and capability.

    - Cyber Kill Chain

  • 15

    This Guide provides a methodology for testing web application security, not for analyzing a cyber attack's relationships.

    - OWASP Testing Guide

  • 16

    This details tactics, techniques, and procedures used by attackers, but it does not specifically address the relationship between adversary, victim, infrastructure, and capability.

    - MITRE ATT&CK

  • 17

    What command should a forensic analyst use to make a forensic disk image of a hard drive?

    - dd

  • 18

    This command is a standard command used in the UNIX/Linux operating system used to create, change, and modify timestamps of a file.

    - touch

  • 19

    This command is used to delete one or more files or directories.

    - rm

  • 20

    This command is a command-line utility for downloading files from the Internet.

    - wget

  • 21

    Which term defines the collection of all points from which an adversary could interact with a system and cause it to function in a way other than how it was designed?

    - Attack surface

  • 22

    This defines the behavior of the adversary.

    - Threat model

  • 23

    This represents the specific points an adversary has chosen for a particular attack.

    - Attack vector

  • 24

    This set is the list of items an adversary can use to conduct their attack.

    - Adversary capability set

  • 25

    Which of the following tools would you use to audit a multi-cloud environment?

    - ScoutSuite

  • 26

    This is a cloud auditing tool, but it can only be used on A.W.S

    - Prowler

  • 27

    This is a general-purpose vulnerability scanner but does not deal with cloud-specific issues.

    - OpenVAS

  • 28

    This is an exploitation framework that is used to test the security configurations of an A.W.S. account

    - Pacu

  • 29

    Which analysis framework provides a graphical depiction of the attacker's approach relative to a kill chain?

    - Diamond Model of Intrusion Analysis

  • 30

    This contains a depth of research on A.P.Ts but does not integrate the detections and mitigation strategy.

    - Open I.O.C.

  • 31

    This framework provides explicit pseudo-code examples for detecting or mitigating a given threat within a network and ties specific behaviors back to individual actors.

    - MITRE ATT&CK framework

  • 32

    This provides a general life cycle description of how attacks occur but do not deal with the specifics of how to mitigate.

    - Lockheed Martin cyber kill chain

  • 33

    Which of the following secure coding best practices ensures a character like  < is translated into the < string when writing to an H.T.M.L page?

    - Output encoding

  • 34

    This can introduce various security problems where detailed internal error messages such as stack traces, database dumps, and error codes are displayed to an attacker.

    - Error handling

  • 35

    This is performed to ensure only properly formed data is entering the workflow in an information system, preventing malformed data from persisting in the database and triggering the malfunction of various downstream components

    - Input validation

  • 36

    This implementation defines the exchange mechanism that will be used between the user and the web application to share and continuously exchange the session I.D.

    - Session management

  • 37

    From which entity does a User Agent request a resource during a S.A.M.L. transaction?

    - Service provider ( S.P. )

  • 38

    This "relies" on the Identity Provider to authenticate users and provide trustworthy identity information, thereby offloading the burden of user authentication and credential management.

    - Relying party ( R.P. )

  • 39

    This requests the principal's credentials if not already signed in and, if correct, provides a SAML response containing one or more assertions

    - Identity provider (IdP)

  • 40

    S.A.M.L. is a solution for providing This and federated identity management.

    - Single sign-on (SSO)

  • 41

    When using the netstat command during an analysis, which of the following connection status messages indicates whether an active connection between two systems exists?

    - ESTABLISHED

  • 42

    This message indicates that the remote end has shut down the connection and is waiting for the socket to close

    - CLOSE_WAIT

  • 43

    This message indicates that the remote end has shut down the connection, and the socket is closed and waiting for an acknowledgment.

    - LAST_ACK

  • 44

    This message indicates that the socket is waiting for an incoming connection from the second system.

    - LISTENING

  • 45

    Alexa is an analyst for a large bank that has offices in multiple states. She wants to create an alert to detect if an employee from one bank office logs into a workstation located at an office in another state. What type of detection and analysis is Alexa configuring?

    - Behavior

  • 46

    is a proactive threat detection method that identifies suspicious activity and potential malware by analyzing code, file characteristics, and system behavior for patterns that resemble known malicious activities, rather than relying solely on exact matches to predefined signatures.

    - Heuristic

  • 47

    is a technique used to identify suspicious and unusual patterns or behaviors in network traffic, user activities, system logs, and other data sources that deviate significantly from what is considered "normal" or expected.

    - Anomaly

  • 48

    is the process of examining historical data over time to identify patterns, shifts, and emerging tendencies related to security threats, incidents, vulnerabilities, and the effectiveness of security controls. It's about understanding "what's been happening" to better predict "what's likely to happen" and "how effectively we're responding."

    - Trend

  • 49

    Which of the following provides the detailed, tactical information that C.SIRT members need when responding to an incident?

    - Procedures

  • 50

    This is a statement of intent and is implemented as a procedure or protocol.

    - Policies

  • 51

    This is a statement by which to determine a course of action. This aims to streamline particular processes according to a set routine or sound practice.

    - Guidelines

  • 52

    This is a basic structure underlying a system, concept, or text.

    - Framework

  • 53

    Which of the following methods should a cybersecurity analyst use to locate any instances on the network where passwords are being sent in cleartext?

    - Full packet capture

  • 54

    This analysis will determine where communications occurred, by what protocol, to which devices, and how much content was sent.

    - Net flow capture

  • 55

    This design documentation may also reveal the designer's intentions for authentication when they created the application, but this only provides an ‘as designed’ approach for a given software and does not provide whether the ‘as-built’ configuration was implemented securely.

    - Software design documentation review

  • 56

    This event log being monitored might detect that an authentication event has occurred. Still, it will not necessarily reveal if the password was sent in cleartext, as a hash value, or in the ciphertext.

    - SIEM event log monitoring

  • 57

    Within evidence collection, What is the following order of evidence you should capture? I.E. ( most likely to change ) first and the least volatile (least likely to change) last.

    - CPU registers and cache memory (L1/L2/L3/GPU), - The contents of system memory (RAM), including a routing table, ARP cache, process tables, kernel statistics, and temporary file systems/swap space/virtual memory., - Collection of data storage devices like hard drives, SSDs, and flash memory devices., - Backup tapes, external media devices (hard drives, DVDs, etc.), and even configuration data or network diagrams

  • 58

    Among the following vulnerabilities, which one was reported as a "Top 10" due to its common occurrence and the potential severity of its impact?

    - Cross-Site Scripting (XSS)

  • 59

    is a class of cybersecurity vulnerabilities that exploit a fundamental performance optimization technique used in nearly all modern C.P.U. (Central Processing Units) called speculative execution. It allows attackers to trick a victim program into revealing sensitive data that it should not normally have access to.

    - Spectre Attack

  • 60

    This Attack was significant and impacted SSL 3.0 protocol, it is not categorized as a top 10 widespread vulnerability.

    - Poodle Attack

  • 61

    This attack was a severe, targeted supply chain attack, not a common vulnerability like X.S.S.

    - SolarWinds SUNBURST Attack

  • 62

    Which one of the following vulnerabilities is commonly referred to as a "Top 10" due to its frequent occurrence and the severe repercussions associated with it?

    - Injection Attacks

  • 63

    This was a significant vulnerability affecting Apache Tomcat servers.

    - Ghostcat

  • 64

    CVE-2020-5902 was a severe vulnerability affecting this Vulnerability.

    - F5 BIG-IP Traffic Management User Interface (TMUI) Remote Code Execution Vulnerability

  • 65

    This Attack was an important finding in the realm of SHA-1 collision but is not typically classified as a top 10 vulnerability.

    - Shattered Attack

  • 66

    An incident responder identifies the perpetrator of a security incident, the victim (a database server), the server used by the attacker, and the SQL injection technique used. Which framework is being employed for this intrusion analysis?

    - Diamond Model of Intrusion Analysis

  • 67

    This attack framework cover ms a variety of tactics, techniques, and procedures used by attackers.

    - MITRE ATT&CK

  • 68

    This Methodology Manual provides a structured approach to security testing.

    - OSS TMM

  • 69

    This describes the stages of a cyberattack, not the relationship between the attacker, victim, infrastructure, and capability.

    - Cyber Kill Chain

  • 70

    In the WannaCry ransomware attack, the NSA's leaked EternalBlue exploit was used to propagate the ransomware. In the context of the Diamond Model of Intrusion Analysis, what does the EternalBlue exploit represent?

    - Capability

  • 71

    This is the entity conducting the attack, not the tools or techniques used in the attack.

    - Adversary

  • 72

    This refers to the physical and virtual resources used in the attack, not the tools or techniques used in the attack.

    - Infrastructure

  • 73

    This is the target of the attack, not the tools or techniques used in the attack.

    - Victim

  • 74

    In the Diamond Model of Intrusion Analysis, which of the four components represents the entity or individual who conducts the cyber attack?

    - Adversary

  • 75

    This component refers to the physical and virtual resources utilized in the attack, not the one who conducts it.

    - Infrastructure

  • 76

    This represents the entity that is targeted by the attack, not the one who conducts it.

    - Victim

  • 77

    This represents the tools and techniques used in the attack, not the entity or individual conducting it.

    - Capability

  • 78

    Following a significant data breach, a multinational corporation has hired a third-party firm to systematically search through its IT systems to identify the intrusion's origin and extent. This external firm is also expected to provide a detailed report on their findings. Which of the following post-incident activities BEST describes what the corporation is performing in this scenario?

    - Forensic analysis

  • 79

    This analysis is a method used to identify the primary cause or causes of an incident. Although this may be part of the overall process, the scenario specifically mentions a detailed and systematic examination, which aligns more with forensic analysis.

    - Root cause analysis

  • 80

    This is a set of procedures and processes to handle and manage an incident effectively.

    - Incident response plan

  • 81

    This is the process of reflecting on a completed incident to identify what was done well and what needs improvement for future incidents.

    - Lessons learned

  • 82

    The 2017 WannaCry ransomware attack exploited a specific vulnerability in Microsoft's implementation of the SMB protocol, impacting thousands of computers worldwide. Which of the following patches, if applied timely, could have prevented this large-scale compromise?

    - MS17-010

  • 83

    This bulletin addressed a collection of vulnerabilities, primarily focused on the Microsoft Graphics Component, as well as issues in Microsoft Windows, Microsoft Office, Skype for Business, Silverlight, and the .NET Framework.

    - MS16-120

  • 84

    This bulletin addressed multiple vulnerabilities, primarily within Windows Uniscribe, a complex script layout engine used by various Windows applications to render text.

    - MS17-011

  • 85

    This bulletin addressed elevation of privilege vulnerabilities in Microsoft Windows kernel-mode drivers.

    - MS16-098

  • 86

    You are a cybersecurity analyst investigating a potential network issue at your company. You suspect there is unusual traffic on your company's network. Which of the following tools would be most effective for capturing and analyzing network packets in real-time to investigate this issue?

    - tcpdump

  • 87

    This is a basic network tool used to test whether a particular host is reachable across an I.P. network and to measure the round-trip time for packets. It doesn't provide real-time traffic analysis.

    - Ping

  • 88

    This is also a network protocol analyzer, it provides a GUI and more detailed analysis features than tcpdump.

    - Wireshark

  • 89

    This is primarily used for network discovery and security auditing. It can identify what hosts are available on the network, what services those hosts are offering, what operating systems they are running, and what type of packet filters/firewalls are in use.

    - Nmap

  • (Finals) Application Development Mocktest BSIT 505

    (Finals) Application Development Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 62問 · 1ヶ月前

    (Finals) Application Development Mocktest BSIT 505

    (Finals) Application Development Mocktest BSIT 505

    62問 • 1ヶ月前
    Xai Alexandrei Delos Reyes

    A320 GEN FAM

    A320 GEN FAM

    ユーザ名非公開 · 100問 · 2ヶ月前

    A320 GEN FAM

    A320 GEN FAM

    100問 • 2ヶ月前
    ユーザ名非公開

    M11c18⚡️

    M11c18⚡️

    مقطع من الاغاني عراقيه قصيره · 20問 · 2ヶ月前

    M11c18⚡️

    M11c18⚡️

    20問 • 2ヶ月前
    مقطع من الاغاني عراقيه قصيره

    M11c16

    M11c16

    مقطع من الاغاني عراقيه قصيره · 9問 · 2ヶ月前

    M11c16

    M11c16

    9問 • 2ヶ月前
    مقطع من الاغاني عراقيه قصيره

    Process Control and Analysis

    Process Control and Analysis

    ユーザ名非公開 · 24問 · 3ヶ月前

    Process Control and Analysis

    Process Control and Analysis

    24問 • 3ヶ月前
    ユーザ名非公開

    EALIC

    EALIC

    Lorenzo Cokee · 22問 · 3ヶ月前

    EALIC

    EALIC

    22問 • 3ヶ月前
    Lorenzo Cokee

    6 ) System Processes

    6 ) System Processes

    The R.S.S.H Delivery Company · 8問 · 3ヶ月前

    6 ) System Processes

    6 ) System Processes

    8問 • 3ヶ月前
    The R.S.S.H Delivery Company

    1 Airconditioning - Pressurization

    1 Airconditioning - Pressurization

    Via · 59問 · 3ヶ月前

    1 Airconditioning - Pressurization

    1 Airconditioning - Pressurization

    59問 • 3ヶ月前
    Via

    Commercial Package Policy Quiz 4

    Commercial Package Policy Quiz 4

    ユーザ名非公開 · 15問 · 3ヶ月前

    Commercial Package Policy Quiz 4

    Commercial Package Policy Quiz 4

    15問 • 3ヶ月前
    ユーザ名非公開

    10 Hydraulic System

    10 Hydraulic System

    Via · 62問 · 4ヶ月前

    10 Hydraulic System

    10 Hydraulic System

    62問 • 4ヶ月前
    Via

    9 Fuel System

    9 Fuel System

    Via · 49問 · 4ヶ月前

    9 Fuel System

    9 Fuel System

    49問 • 4ヶ月前
    Via

    5 Indicating / Recording Systems

    5 Indicating / Recording Systems

    Via · 21問 · 4ヶ月前

    5 Indicating / Recording Systems

    5 Indicating / Recording Systems

    21問 • 4ヶ月前
    Via

    CDI 108 PRELIM

    CDI 108 PRELIM

    #100 · 46問 · 4ヶ月前

    CDI 108 PRELIM

    CDI 108 PRELIM

    46問 • 4ヶ月前
    #100

    COMPUTER 2ND QUARTER

    COMPUTER 2ND QUARTER

    Karla Marie Ybañez · 38問 · 4ヶ月前

    COMPUTER 2ND QUARTER

    COMPUTER 2ND QUARTER

    38問 • 4ヶ月前
    Karla Marie Ybañez

    セキュリティ

    セキュリティ

    akari · 100問 · 4ヶ月前

    セキュリティ

    セキュリティ

    100問 • 4ヶ月前
    akari

    セキュリティ

    セキュリティ

    akari · 64問 · 4ヶ月前

    セキュリティ

    セキュリティ

    64問 • 4ヶ月前
    akari

    Introduction to Computing

    Introduction to Computing

    ユーザ名非公開 · 19問 · 4ヶ月前

    Introduction to Computing

    Introduction to Computing

    19問 • 4ヶ月前
    ユーザ名非公開

    finals

    finals

    Adrian Ramirez · 35問 · 5ヶ月前

    finals

    finals

    35問 • 5ヶ月前
    Adrian Ramirez

    REMEDIAL

    REMEDIAL

    The R.S.S.H Delivery Company · 5問 · 5ヶ月前

    REMEDIAL

    REMEDIAL

    5問 • 5ヶ月前
    The R.S.S.H Delivery Company

    28 ) SY EX. 12 | COMPLETE

    28 ) SY EX. 12 | COMPLETE

    The R.S.S.H Delivery Company · 85問 · 5ヶ月前

    28 ) SY EX. 12 | COMPLETE

    28 ) SY EX. 12 | COMPLETE

    85問 • 5ヶ月前
    The R.S.S.H Delivery Company

    問題一覧

  • 1

    Which of the following security policies could help detect fraudulent cases that occur even when other security controls are already in place?

    - Mandatory vacations

  • 2

    This is the concept of having more than one person required to complete a particular task to prevent fraud and error.

    - Separation of duties

  • 3

    This, instead, requires both people to act together. For example, a nuclear missile system uses dual control and requires two people to each turn a different key simultaneously to allow for a missile launch to occur.

    - Dual control

  • 4

    This is the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities.

    - Least privilege

  • 5

    Which law requires government agencies and other organizations that operate systems on behalf of government agencies to comply with security standards?

    - FISMA

  • 6

    This is a United States federal law that imposes certain requirements on operators of websites or online services directed to children under 13 years of age and on operators of other websites or online services that have actual knowledge that they are collecting personal information online from a child under 13 years of age.

    - COPPA

  • 7

    This is a United States federal law that set new or expanded requirements for all U.S. public company boards, management, and public accounting firms.

    - SOX

  • 8

    This a United States federal law designed to provide privacy standards to protect patients' medical records and other health information provided to health plans, doctors, hospitals, and other health care providers.

    - HIPPA

  • 9

    An organization is conducting a cybersecurity training exercise. What team is Jason assigned to if he has been asked to monitor and manage the defenders' and attackers' technical environment during the exercise?

    - White team

  • 10

    This team is made up of both the blue and red teams to work together to maximize their cyber capabilities through continuous feedback and knowledge transfer between attackers and defenders.

    - Purple team

  • 11

    This team is a group of people responsible for defending an enterprise’s use of information systems by maintaining its security posture against a group of mock attackers.

    - Blue team

  • 12

    This team is a group of people authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s security posture.

    - Red team

  • 13

    Your incident response team has identified a persistent threat actor who has used a spear-phishing attack to compromise a system in your network. The actor used this system to move laterally within the network, stealing sensitive data. The team wants to understand the relationship between the adversary, the victim system, the phishing infrastructure used by the attacker, and the lateral movement capability. Which framework would best help them in this analysis?

    - Diamond Model of Intrusion Analysis

  • 14

    This describes the stages of a cyber attack, but it does not specifically analyze the relationships between the adversary, victim, infrastructure, and capability.

    - Cyber Kill Chain

  • 15

    This Guide provides a methodology for testing web application security, not for analyzing a cyber attack's relationships.

    - OWASP Testing Guide

  • 16

    This details tactics, techniques, and procedures used by attackers, but it does not specifically address the relationship between adversary, victim, infrastructure, and capability.

    - MITRE ATT&CK

  • 17

    What command should a forensic analyst use to make a forensic disk image of a hard drive?

    - dd

  • 18

    This command is a standard command used in the UNIX/Linux operating system used to create, change, and modify timestamps of a file.

    - touch

  • 19

    This command is used to delete one or more files or directories.

    - rm

  • 20

    This command is a command-line utility for downloading files from the Internet.

    - wget

  • 21

    Which term defines the collection of all points from which an adversary could interact with a system and cause it to function in a way other than how it was designed?

    - Attack surface

  • 22

    This defines the behavior of the adversary.

    - Threat model

  • 23

    This represents the specific points an adversary has chosen for a particular attack.

    - Attack vector

  • 24

    This set is the list of items an adversary can use to conduct their attack.

    - Adversary capability set

  • 25

    Which of the following tools would you use to audit a multi-cloud environment?

    - ScoutSuite

  • 26

    This is a cloud auditing tool, but it can only be used on A.W.S

    - Prowler

  • 27

    This is a general-purpose vulnerability scanner but does not deal with cloud-specific issues.

    - OpenVAS

  • 28

    This is an exploitation framework that is used to test the security configurations of an A.W.S. account

    - Pacu

  • 29

    Which analysis framework provides a graphical depiction of the attacker's approach relative to a kill chain?

    - Diamond Model of Intrusion Analysis

  • 30

    This contains a depth of research on A.P.Ts but does not integrate the detections and mitigation strategy.

    - Open I.O.C.

  • 31

    This framework provides explicit pseudo-code examples for detecting or mitigating a given threat within a network and ties specific behaviors back to individual actors.

    - MITRE ATT&CK framework

  • 32

    This provides a general life cycle description of how attacks occur but do not deal with the specifics of how to mitigate.

    - Lockheed Martin cyber kill chain

  • 33

    Which of the following secure coding best practices ensures a character like  < is translated into the < string when writing to an H.T.M.L page?

    - Output encoding

  • 34

    This can introduce various security problems where detailed internal error messages such as stack traces, database dumps, and error codes are displayed to an attacker.

    - Error handling

  • 35

    This is performed to ensure only properly formed data is entering the workflow in an information system, preventing malformed data from persisting in the database and triggering the malfunction of various downstream components

    - Input validation

  • 36

    This implementation defines the exchange mechanism that will be used between the user and the web application to share and continuously exchange the session I.D.

    - Session management

  • 37

    From which entity does a User Agent request a resource during a S.A.M.L. transaction?

    - Service provider ( S.P. )

  • 38

    This "relies" on the Identity Provider to authenticate users and provide trustworthy identity information, thereby offloading the burden of user authentication and credential management.

    - Relying party ( R.P. )

  • 39

    This requests the principal's credentials if not already signed in and, if correct, provides a SAML response containing one or more assertions

    - Identity provider (IdP)

  • 40

    S.A.M.L. is a solution for providing This and federated identity management.

    - Single sign-on (SSO)

  • 41

    When using the netstat command during an analysis, which of the following connection status messages indicates whether an active connection between two systems exists?

    - ESTABLISHED

  • 42

    This message indicates that the remote end has shut down the connection and is waiting for the socket to close

    - CLOSE_WAIT

  • 43

    This message indicates that the remote end has shut down the connection, and the socket is closed and waiting for an acknowledgment.

    - LAST_ACK

  • 44

    This message indicates that the socket is waiting for an incoming connection from the second system.

    - LISTENING

  • 45

    Alexa is an analyst for a large bank that has offices in multiple states. She wants to create an alert to detect if an employee from one bank office logs into a workstation located at an office in another state. What type of detection and analysis is Alexa configuring?

    - Behavior

  • 46

    is a proactive threat detection method that identifies suspicious activity and potential malware by analyzing code, file characteristics, and system behavior for patterns that resemble known malicious activities, rather than relying solely on exact matches to predefined signatures.

    - Heuristic

  • 47

    is a technique used to identify suspicious and unusual patterns or behaviors in network traffic, user activities, system logs, and other data sources that deviate significantly from what is considered "normal" or expected.

    - Anomaly

  • 48

    is the process of examining historical data over time to identify patterns, shifts, and emerging tendencies related to security threats, incidents, vulnerabilities, and the effectiveness of security controls. It's about understanding "what's been happening" to better predict "what's likely to happen" and "how effectively we're responding."

    - Trend

  • 49

    Which of the following provides the detailed, tactical information that C.SIRT members need when responding to an incident?

    - Procedures

  • 50

    This is a statement of intent and is implemented as a procedure or protocol.

    - Policies

  • 51

    This is a statement by which to determine a course of action. This aims to streamline particular processes according to a set routine or sound practice.

    - Guidelines

  • 52

    This is a basic structure underlying a system, concept, or text.

    - Framework

  • 53

    Which of the following methods should a cybersecurity analyst use to locate any instances on the network where passwords are being sent in cleartext?

    - Full packet capture

  • 54

    This analysis will determine where communications occurred, by what protocol, to which devices, and how much content was sent.

    - Net flow capture

  • 55

    This design documentation may also reveal the designer's intentions for authentication when they created the application, but this only provides an ‘as designed’ approach for a given software and does not provide whether the ‘as-built’ configuration was implemented securely.

    - Software design documentation review

  • 56

    This event log being monitored might detect that an authentication event has occurred. Still, it will not necessarily reveal if the password was sent in cleartext, as a hash value, or in the ciphertext.

    - SIEM event log monitoring

  • 57

    Within evidence collection, What is the following order of evidence you should capture? I.E. ( most likely to change ) first and the least volatile (least likely to change) last.

    - CPU registers and cache memory (L1/L2/L3/GPU), - The contents of system memory (RAM), including a routing table, ARP cache, process tables, kernel statistics, and temporary file systems/swap space/virtual memory., - Collection of data storage devices like hard drives, SSDs, and flash memory devices., - Backup tapes, external media devices (hard drives, DVDs, etc.), and even configuration data or network diagrams

  • 58

    Among the following vulnerabilities, which one was reported as a "Top 10" due to its common occurrence and the potential severity of its impact?

    - Cross-Site Scripting (XSS)

  • 59

    is a class of cybersecurity vulnerabilities that exploit a fundamental performance optimization technique used in nearly all modern C.P.U. (Central Processing Units) called speculative execution. It allows attackers to trick a victim program into revealing sensitive data that it should not normally have access to.

    - Spectre Attack

  • 60

    This Attack was significant and impacted SSL 3.0 protocol, it is not categorized as a top 10 widespread vulnerability.

    - Poodle Attack

  • 61

    This attack was a severe, targeted supply chain attack, not a common vulnerability like X.S.S.

    - SolarWinds SUNBURST Attack

  • 62

    Which one of the following vulnerabilities is commonly referred to as a "Top 10" due to its frequent occurrence and the severe repercussions associated with it?

    - Injection Attacks

  • 63

    This was a significant vulnerability affecting Apache Tomcat servers.

    - Ghostcat

  • 64

    CVE-2020-5902 was a severe vulnerability affecting this Vulnerability.

    - F5 BIG-IP Traffic Management User Interface (TMUI) Remote Code Execution Vulnerability

  • 65

    This Attack was an important finding in the realm of SHA-1 collision but is not typically classified as a top 10 vulnerability.

    - Shattered Attack

  • 66

    An incident responder identifies the perpetrator of a security incident, the victim (a database server), the server used by the attacker, and the SQL injection technique used. Which framework is being employed for this intrusion analysis?

    - Diamond Model of Intrusion Analysis

  • 67

    This attack framework cover ms a variety of tactics, techniques, and procedures used by attackers.

    - MITRE ATT&CK

  • 68

    This Methodology Manual provides a structured approach to security testing.

    - OSS TMM

  • 69

    This describes the stages of a cyberattack, not the relationship between the attacker, victim, infrastructure, and capability.

    - Cyber Kill Chain

  • 70

    In the WannaCry ransomware attack, the NSA's leaked EternalBlue exploit was used to propagate the ransomware. In the context of the Diamond Model of Intrusion Analysis, what does the EternalBlue exploit represent?

    - Capability

  • 71

    This is the entity conducting the attack, not the tools or techniques used in the attack.

    - Adversary

  • 72

    This refers to the physical and virtual resources used in the attack, not the tools or techniques used in the attack.

    - Infrastructure

  • 73

    This is the target of the attack, not the tools or techniques used in the attack.

    - Victim

  • 74

    In the Diamond Model of Intrusion Analysis, which of the four components represents the entity or individual who conducts the cyber attack?

    - Adversary

  • 75

    This component refers to the physical and virtual resources utilized in the attack, not the one who conducts it.

    - Infrastructure

  • 76

    This represents the entity that is targeted by the attack, not the one who conducts it.

    - Victim

  • 77

    This represents the tools and techniques used in the attack, not the entity or individual conducting it.

    - Capability

  • 78

    Following a significant data breach, a multinational corporation has hired a third-party firm to systematically search through its IT systems to identify the intrusion's origin and extent. This external firm is also expected to provide a detailed report on their findings. Which of the following post-incident activities BEST describes what the corporation is performing in this scenario?

    - Forensic analysis

  • 79

    This analysis is a method used to identify the primary cause or causes of an incident. Although this may be part of the overall process, the scenario specifically mentions a detailed and systematic examination, which aligns more with forensic analysis.

    - Root cause analysis

  • 80

    This is a set of procedures and processes to handle and manage an incident effectively.

    - Incident response plan

  • 81

    This is the process of reflecting on a completed incident to identify what was done well and what needs improvement for future incidents.

    - Lessons learned

  • 82

    The 2017 WannaCry ransomware attack exploited a specific vulnerability in Microsoft's implementation of the SMB protocol, impacting thousands of computers worldwide. Which of the following patches, if applied timely, could have prevented this large-scale compromise?

    - MS17-010

  • 83

    This bulletin addressed a collection of vulnerabilities, primarily focused on the Microsoft Graphics Component, as well as issues in Microsoft Windows, Microsoft Office, Skype for Business, Silverlight, and the .NET Framework.

    - MS16-120

  • 84

    This bulletin addressed multiple vulnerabilities, primarily within Windows Uniscribe, a complex script layout engine used by various Windows applications to render text.

    - MS17-011

  • 85

    This bulletin addressed elevation of privilege vulnerabilities in Microsoft Windows kernel-mode drivers.

    - MS16-098

  • 86

    You are a cybersecurity analyst investigating a potential network issue at your company. You suspect there is unusual traffic on your company's network. Which of the following tools would be most effective for capturing and analyzing network packets in real-time to investigate this issue?

    - tcpdump

  • 87

    This is a basic network tool used to test whether a particular host is reachable across an I.P. network and to measure the round-trip time for packets. It doesn't provide real-time traffic analysis.

    - Ping

  • 88

    This is also a network protocol analyzer, it provides a GUI and more detailed analysis features than tcpdump.

    - Wireshark

  • 89

    This is primarily used for network discovery and security auditing. It can identify what hosts are available on the network, what services those hosts are offering, what operating systems they are running, and what type of packet filters/firewalls are in use.

    - Nmap