Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free CREST CPTIA Practice Exam with Questions & Answers | Set: 2

Questions 11

A colleague wants to minimize their security responsibility because they are in a small organization. They are evaluating a new application that is offered in different forms. Which form would result in the least amount of responsibility for the colleague?

Options:
A.

On-prom installation

B.

saaS

C.

laaS

D.

PaaS

CREST CPTIA Premium Access
Questions 12

Your company sells SaaS, and your company itself is hosted in the cloud (using it as a PaaS). In case of a malware incident in your customer's database, who is responsible for eradicating the malicious software?

Options:
A.

Your company

B.

Building management

C.

The PaaS provider

D.

The customer

Questions 13

An attacker instructs bots to use camouflage mechanism to hide his phishing and malware delivery locations in the rapidly changing network of compromised bots. In this particular technique, a single domain name consists of multiple IP addresses.

Which of the following technique is used by the attacker?

Options:
A.

DNS zone transfer

B.

Dynamic DNS

C.

DNS interrogation

D.

Fast-Flux DNS

Questions 14

An incident handler is analyzing email headers to find out suspicious emails.

Which of the following tools he/she must use in order to accomplish the task?

Options:
A.

Barracuda Email Security Gateway

B.

Gophish

C.

SPAMfighter

Questions 15

ABC is a well-established cyber-security company in the United States. The organization implemented the automation of tasks such as data enrichment and indicator aggregation. They also joined various communities to increase their knowledge about the emerging threats. However, the security teams can only detect and prevent identified threats in a reactive approach.

Based on threat intelligence maturity model, identify the level of ABC to know the stage at which the organization stands with its security and vulnerabilities.

Options:
A.

Level 2: increasing CTI capabilities

B.

Level 3: CTI program in place

C.

Level 1: preparing for CTI

D.

Level 0: vague where to start

Questions 16

Which of the following components refers to a node in the network that routes the traffic from a workstation to external command and control server and helps in identification of installed malware in the network?

Options:
A.

Repeater

B.

Gateway

C.

Hub

D.

Network interface card (NIC)

Questions 17

Clark, a professional hacker, exploited the web application of a target organization by

tampering the form and parameter values. He successfully exploited the web

application and gained access to the information assets of the organization.

Identify the vulnerability in the web application exploited by the attacker.

Options:
A.

Broken access control

B.

Security misconfiguration

C.

SQL injection

D.

Sensitive data exposure

Questions 18

In which of the following storage architecture is the data stored in a localized system, server, or storage hardware and capable of storing a limited amount of data in its database and locally available for data usage?

Options:
A.

Distributed storage

B.

Object-based storage

C.

Centralized storage

D.

Cloud storage

Questions 19

A threat analyst wants to incorporate a requirement in the threat knowledge repository that provides an ability to modify or delete past or irrelevant threat data.

Which of the following requirement must he include in the threat knowledge repository to fulfil his needs?

Options:
A.

Protection ranking

B.

Evaluating performance

C.

Data management

D.

Searchable functionality

Questions 20

Investigator Ian gives you a drive image to investigate. What type of analysis are you performing?

Options:
A.

Real-time

B.

Static

C.

Dynamic

D.

Live