問題一覧
1
- Chain of custody
2
- Suspend the machine and copy the contents of the directory it resides in.
3
- SQLite
4
- The destination drive is formatted FAT32.
5
- certutil
6
- None of the above
7
- Containment, eradication, and recovery
8
- Supplemented
9
- Drive analysis
10
- Isolation
11
- A precursor
12
- Post-incident recovery
13
- Patching
14
- An adverse event
15
- Microsoft Office document metadata
16
- Create documentation.
17
- Outsource to an incident response provider.
18
- Clear, purge, destroy
19
- Purging.
20
- It provides a block-level snapshot and can be safely deleted.
21
- FAT32
22
- Collect live forensic information, take photos of each system, and power them down.
23
- E-discovery
24
- All individuals who work with evidence in the investigation
25
- An authenticated vulnerability scan from a trusted internal network
26
- Providing authority and resources
27
- Maintain backups of every system and device.
28
- Notification and communication
29
- Shut the system down, remove the drive, and copy it from another system.
30
- The System Reserved and C: partitions
31
- 1 to 2 years
32
- Ability to preserve evidence
33
- RAW
34
- Deleted files
35
- Lessons learned review
36
- CPU cache, network traffic, disk drives, optical media
37
- Containment, eradication, and recovery
38
- All of the above
39
- Identifying attackers is not an important part of the incident response process.
40
- The backup is a differential backup.
41
- A second examiner acting as a witness and countersigning all actions
42
- Isolate the system before restoring from backups.
43
- Slack space
44
- A trusted system binary kit
45
- IP addresses, MAC addresses, hostname
46
- Endpoint forensics
47
- Disconnect the system from the network.
48
- Slack space
49
- Hibernation file analysis
50
- Beaconing
51
- As an integrity loss
52
- Containment, eradication, and recovery
53
- Use the built-in Windows delete command line.
54
- Postmortem forensics
55
- Windows system files
56
- Create an image using a tool like FTK Imager Lite.
57
- A privilege escalation attack from a lower privileged account or service
58
- The original creation date, the device type, the GPS location, and manufacturer of the device
59
- A jump kit
60
- None; Facebook strips almost all useful metadata from images.
61
- DVDs, hard drives, virtual memory, caches
62
- Microsoft Word files are stored in ZIP format.
63
- The Windows command prompt does not store command history.
64
- Angela cannot assess the impact with the data given.
65
- Validation
66
- Tamper-proof seals
67
- Detection and analysis, and containment, eradication, and recovery
68
- The destination disk has bad sectors.
69
- Review SSH logs.
70
- Identifying the attacker
71
- A playbook
72
- Slack space
73
- It will prevent shutdown scripts from running.
74
- OpenVAS
75
- To limit further damage from occurring
76
- Level 2: Logical extraction
77
- A packet capture tool installed on the system
78
- Advanced persistent threat
79
- Identification
80
- Report the issue to counsel.
81
- Processing, review, and analysis
82
- A multi-interface drive adapter
83
- Crime scene tape
84
- A call list
85
- A buffer overflow attack
86
- Emergency change
87
- Tabletop exercise
88
- laas
89
- Checklist review
90
- SSH on TCP port 1433
91
- Analysis of drive capacity consumption
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
- Chain of custody
2
- Suspend the machine and copy the contents of the directory it resides in.
3
- SQLite
4
- The destination drive is formatted FAT32.
5
- certutil
6
- None of the above
7
- Containment, eradication, and recovery
8
- Supplemented
9
- Drive analysis
10
- Isolation
11
- A precursor
12
- Post-incident recovery
13
- Patching
14
- An adverse event
15
- Microsoft Office document metadata
16
- Create documentation.
17
- Outsource to an incident response provider.
18
- Clear, purge, destroy
19
- Purging.
20
- It provides a block-level snapshot and can be safely deleted.
21
- FAT32
22
- Collect live forensic information, take photos of each system, and power them down.
23
- E-discovery
24
- All individuals who work with evidence in the investigation
25
- An authenticated vulnerability scan from a trusted internal network
26
- Providing authority and resources
27
- Maintain backups of every system and device.
28
- Notification and communication
29
- Shut the system down, remove the drive, and copy it from another system.
30
- The System Reserved and C: partitions
31
- 1 to 2 years
32
- Ability to preserve evidence
33
- RAW
34
- Deleted files
35
- Lessons learned review
36
- CPU cache, network traffic, disk drives, optical media
37
- Containment, eradication, and recovery
38
- All of the above
39
- Identifying attackers is not an important part of the incident response process.
40
- The backup is a differential backup.
41
- A second examiner acting as a witness and countersigning all actions
42
- Isolate the system before restoring from backups.
43
- Slack space
44
- A trusted system binary kit
45
- IP addresses, MAC addresses, hostname
46
- Endpoint forensics
47
- Disconnect the system from the network.
48
- Slack space
49
- Hibernation file analysis
50
- Beaconing
51
- As an integrity loss
52
- Containment, eradication, and recovery
53
- Use the built-in Windows delete command line.
54
- Postmortem forensics
55
- Windows system files
56
- Create an image using a tool like FTK Imager Lite.
57
- A privilege escalation attack from a lower privileged account or service
58
- The original creation date, the device type, the GPS location, and manufacturer of the device
59
- A jump kit
60
- None; Facebook strips almost all useful metadata from images.
61
- DVDs, hard drives, virtual memory, caches
62
- Microsoft Word files are stored in ZIP format.
63
- The Windows command prompt does not store command history.
64
- Angela cannot assess the impact with the data given.
65
- Validation
66
- Tamper-proof seals
67
- Detection and analysis, and containment, eradication, and recovery
68
- The destination disk has bad sectors.
69
- Review SSH logs.
70
- Identifying the attacker
71
- A playbook
72
- Slack space
73
- It will prevent shutdown scripts from running.
74
- OpenVAS
75
- To limit further damage from occurring
76
- Level 2: Logical extraction
77
- A packet capture tool installed on the system
78
- Advanced persistent threat
79
- Identification
80
- Report the issue to counsel.
81
- Processing, review, and analysis
82
- A multi-interface drive adapter
83
- Crime scene tape
84
- A call list
85
- A buffer overflow attack
86
- Emergency change
87
- Tabletop exercise
88
- laas
89
- Checklist review
90
- SSH on TCP port 1433
91
- Analysis of drive capacity consumption