=61= In a simulated lab environment, an incident handler uses the CurrPorts tool to monitor TCP/IP connections in the wake of a malware incident. 在模擬實驗室環境中,事件處理員使用 CurrPorts 工具來監控 TCP/IP 連接,應對惡意軟體事件。 The malware, a trojan called njRAT," has been executed on a Windows Server 2016 virtual machine. 惡意軟體,一種名為 njRAT" 的木馬,已在 Windows Server 2016 虛擬機上執行。 After executing the trojan, the handler observes a connection established by the njRAT client on the Windows 10 virtual machine. 執行木馬後,處理員觀察到 Windows 10 虛擬機上 njRAT 客戶端建立的連接。 Using CurrPorts on the infected Windows Server 2016, what course of action should the handler take next? 使用 CurrPorts 在受感染的 Windows Server 2016 上,處理員接下來應該採取什麼行動? A. Run a full antivirus scan on the Windows 10 virtual machine. 在 Windows 10 虛擬機上運行全面的防病毒掃描。 B. Restart Windows Server 2016 to remove the trojan. 重新啟動 Windows Server 2016 以刪除木馬。 C. Immediately disconnect Windows Server 2016 from the network. 立即將 Windows Server 2016 從網絡中斷開。 D. Perform port monitoring to ...
=41= A company's IoT network is experiencing a DDoS attack, disrupting critical operations. 一家公司物聯網網絡正遭受DDoS攻擊,干擾了關鍵操作。 What is the best course of action for the incident response team in this scenario? 在這種情況下,事件響應團隊應採取的最佳行動是什麼? A. Block all incoming traffic to the IoT network 封鎖所有進入物聯網網絡的流量 B. Notify senior management and other stakeholders 通知高級管理層和其他相關方 C. Disconnect the affected IoT devices from the network 將受影響的物聯網設備斷開網絡 D. Increase bandwidth to the IoT network to handle the attack 增加物聯網網絡的帶寬以應對攻擊 =42= At NeoTech, after a suspected insider threat incident, a smartphone believed to be a key piece of evidence was secured. 在NeoTech,經歷了一次懷疑內部威脅事件後,一部被認為是關鍵證據的智能手機被保全了。 While waiting for forensic experts, what should the incident handler do to maintain the phone's data integrity? 在等待法醫專家的同時,事件處理人員應該如何維護手機的數據完整性? A. Take photos of all opened apps and active screens for documentation 拍攝所有已打開的應用程序和活動屏幕以作記錄 B. Place the phone in a Faraday bag to prevent remote wiping or communication...