跳到主要內容

ECIH_A_001-010

 =001==

Patrick is doing a cyber forensic investigation.

Patrick 正在進行網路鑑識調查。

He is in the process of collecting physical evidence at the crime scene.

他正在犯罪現場收集實體證據。

Which of the following elements must he consider while collecting physical evidence?

在收集實體證據時,他必須考慮以下哪些因素?

Published name servers and web application source code, 公開的名稱伺服器和網頁應用程式源代碼

DNS information including domain and subdomains, DNS 資訊,包括域名和子域名

Removable media, cable, and publications, 可移動媒介、電纜和出版物

Open ports, services, and operating system (OS) vulnerabilities, 開放的端口、服務和作業系統(OS)漏洞

 

=002==

Eric works as a system administrator at ABC organization

Eric ABC 組織的系統管理員

and previously granted several users with access privileges to the organization's systems with unlimited permissions.

先前授予多名使用者無限許可權來訪問該組織的系統。

These privileged users could prospectively misuse their rights unintentionally, maliciously, or could be deceived by attackers that could allow them to perform malicious activities.

這些擁有特權的使用者可能會無意間、惡意地或被攻擊者欺騙而濫用其權利,從而執行惡意活動。

Which of the following guidelines would help incident handlers eradicate insider attacks by privileged users?

以下哪項指南將幫助事件處理人員根除特權使用者的內部攻擊?

Do not allow administrators to use unique accounts during the installation process, 不允許管理員在安裝過程中使用唯一帳戶

Use the encryption methods to prevent administrators and privileged users from accessing backup tapes and disks, 使用加密方法防止管理員和特權使用者訪問備份磁帶和磁碟

Do not change the access to the administrators and privileged users, 不要更改對管理員和特權使用者的訪問權限

Do not use default administrative accounts to ensure accountability, 不要使用預設的管理帳戶以確保問責制

 

=003==

Which of the following email security tools can be used by an incident handler to prevent the organization against evolving email threats?

以下哪種電子郵件安全工具可供事件處理人員使用,以防止組織面臨不斷發展的電子郵件威脅?

MxToolbox, MxToolbox

G Suite Toolbox, G Suite Toolbox

Email Header Analyzer, Email Header Analyzer

Gpg4win, Gpg4win

 

=004==

Racheal is an incident handler working at an organization called InceptionTech.

Racheal 是一家名為 InceptionTech 的組織的事件處理人員。

Recently, numerous employees have been complaining about receiving emails from unknown senders.

最近,許多員工抱怨收到來自未知發件人的電子郵件。

In order to prevent employees from spoofing emails and keeping security in mind, Racheal was asked to take appropriate actions in this matter.

為了防止員工欺騙電子郵件並考慮到安全性,Racheal 被要求採取適當的行動。

As a part of her assignment, she needs to analyze the email headers to check the authenticity of received emails.

作為任務的一部分,她需要分析電子郵件標頭以檢查收到的電子郵件的真實性。

Which of the following protocol/authentication standards she must check in email header to analyze the email authenticity?

她必須檢查電子郵件標頭中的哪些協定/驗證標準以分析電子郵件的真實性?

POP, POP

SNMP, SNMP

DKIM, DKIM

ARP, ARP

 

=005==

Bonney's system has been compromised by a gruesome malware.

Bonney 的系統已被可怕的惡意軟體攻擊。

What is the primary step that is necessary to perform in order to contain the malware incident from spreading?

為了防止惡意軟體事件擴散,必須採取的主要步驟是什麼?

What is the cause of this issue?

這個問題的原因是什麼?

Complaint to police in a formal way regarding the incident, 正式向警方投訴該事件

Turn off the infected machine, 關閉受感染的機器

Leave it to network administrators to handle, 交由網路管理員處理

Call the legal department in the organization and inform about the incident, 通知組織內的法律部門並告知事件

 

=006==

Worried about getting caught, he decided to forge his identity.

擔心被抓,他決定偽造身份。

To do so, he created a new identity by obtaining information from different victims.

為此,他通過獲取不同受害者的資訊創建了一個新身份。

Identify the type of identity theft Adam has performed.

確定 Adam 執行的身份盜用類型。

Medical identity theft, 醫療身份盜用

Social identity theft, 社會身份盜用

Synthetic identity theft, 合成身份盜用

Tax identity theft, 稅務身份盜用

 

=007==

Rinni is an incident handler and she is performing memory dump analysis.

Rinni 是事件處理人員,她正在執行記憶體傾印分析。

Which of following tools she can use in order to perform a memory dump analysis?

她可以使用以下哪種工具來進行記憶體傾印分析?

NetSim, NetSim

OllyDbg and IDA Pro, OllyDbg IDA Pro

Procmon and ProcessExplorer, Procmon ProcessExplorer

Scylla and OllyDumpEx, Scylla OllyDumpEx

 

=008==

Rose is an incident handler and is responsible for detecting and eliminating any kind of scanning attempts over the network by malicious threat actors.

Rose 是事件處理人員,負責檢測和消除惡意威脅行為者在網路上的任何掃描嘗試。

Rose uses Wireshark to sniff the network and detect any noise in the network by malicious threat actors.

Rose 使用 Wireshark 嗅探網路並檢測惡意威脅行為者在網路上的任何噪音。

While doing so, Rose is going through the following Wireshark filters.

在此過程中,Rose 使用以下 Wireshark 過濾器。

Which of the following Wireshark filters can be used by her to detect the Xmas scan attempt by the attacker?

她可以使用以下哪種 Wireshark 過濾器來檢測攻擊者的 Xmas 掃描嘗試?

tcp.flags.reset==1, tcp.flags.reset==1

tcp.flags==0x00, tcp.flags==0x00

tcp.flags==0x029, tcp.flags==0x029

tcp.dstport==7, tcp.dstport==7

 

=009==

Which of the following is not a countermeasure to eradicate cloud security incidents?

以下哪項不是根除雲端安全事件的對策?

Checking for data protection at both design and runtime, 檢查設計和運行時的資料保護

Disabling security options such as two-factor authentication and CAPTCHA, 停用雙因素驗證和 CAPTCHA 等安全選項

Patching the database vulnerabilities and improving the isolation mechanism, 修補資料庫漏洞並改進隔離機制

Removing the malware files and traces from the affected components, 從受影響的組件中移除惡意軟體檔案和痕跡

 

=010==

Who is mainly responsible for providing proper network services and handling network-related incidents in each cloud service model?

在每個雲端服務模型中,誰主要負責提供適當的網路服務和處理網路相關事件?

Cloud brokers, 雲端經紀人

Cloud service provider, 雲端服務提供者

Cloud consumer, 雲端消費者

Cloud auditor, 雲端審計員

 

CDDCB CBCBB

留言

這個網誌中的熱門文章

ECIH_A_051-060

  =051== In which of the following phases of incident handling and response (IH&R) process are the identified security incidents analyzed, validated, categorized, and prioritized? 在事件處理和響應 (IH&R) 流程的哪個階段,已識別的安全事件會被分析、驗證、分類和優先排序? A. Incident triage, 事件分類 B. Notification, 通知 C. Incident recording and assignment, 事件記錄和分配 D. Containment, 控制   =052== Browser data can be used to access various credentials. 瀏覽器數據可以用來訪問各種憑證。 Which of the following tools is used to analyze the history data files in Microsoft Edge browser? 以下哪個工具用於分析 Microsoft Edge 瀏覽器中的歷史數據文件? A. MZHistoryView B. BrowsingHistoryView C. ChromeHistoryView D. MZCacheView   =053== Eve is an incident handler in ABC organization. Eve 是 ABC 組織的事件處理人員。 One day, she got a complaint about an email hacking incident from one of the employees of the organization. 有一天,她收到該組織的一名員工關於電子郵件駭客事件的投訴。 As an incident handler, Eve follows a set of recovery steps in order to recover...

ECIH_B_001-010

  =001== XYZ Corp. recently shifted its infrastructure to Microsoft Azure and soon after faced an unexpected data breach. XYZ 公司最近將其基礎設施轉移到 Microsoft Azure ,但不久後就遭遇了意外的數據洩漏事件。 The event led to confidential data being accessed by an unauthorized user. 該事件導致機密數據被未經授權的用戶訪問。 As the newly appointed EC-Council Certified Incident Handler, you are tasked with improving the incident response strategy to prevent such security incidents in the future. 作為新任命的 EC-Council 認證事件處理人員,您被要求改進事件響應策略,以防止未來發生此類安全事件。 What is the best course of action? 最佳行動方案是什麼? · Activate Azure disk encryption for all data stored in the cloud. 啟用 Azure 磁碟加密,對雲端中儲存的所有數據進行加密。 · Transition all operations to Azure private network to enhance control over data. 將所有操作轉移到 Azure 私人網路,以增強對數據的控制。 · Implement Azure network security groups to limit access to resources. 實施 Azure 網路安全群組,限制對資源的訪問。 · Set up Azure Security Center and enable just-in-time VM access. 設置 Azure 安全中心並啟用即時虛擬機存取。 =002== The CEO of a l...

ECIH_B_031-040

=031== An employee accidentally emails confidential customer information to a personal email address. 一名員工不小心將機密客戶資訊發送到個人電子郵件地址。 What is the biggest challenge faced by the incident response team in this scenario? 在此情境中,事件回應團隊面臨的最大挑戰是什麼? Ⓐ Determining the intent of the employee 確定員工的意圖 Ⓑ Balancing the need for confidentiality and transparency with stakeholders 平衡保密需求與對利害關係人保持透明之間的需求 Ⓒ Identifying the extent of the damage caused by the incident 確定事件造成的損害程度 Ⓓ Identifying the source of the email server used to send the email 確定用於發送郵件的電子郵件伺服器的來源 =032== An incident handling team has been alerted about a possible security breach on a Linux system. 一個事件處理團隊收到有關 Linux 系統可能發生安全漏洞的警報。 As an EC-Council Certified Incident Handler, you decide to perform an incident triage using a tool named buck-security on Linux. 作為 EC-Council 認證的事件處理人員,您決定使用名為 buck-security 的工具在 Linux 上進行事件分類。 After conducting the security check, buck-security returns a warning message indicating a ...